Source: | Binary string: D:\a\wix4\wix4\build\burn\Release\x86\burn.pdb source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000002.2090864201.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000000.2054346331.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2088453134.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000000.2065684362.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local StateT source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local StateC source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: lC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: RoboTaskLite.exe, 00000002.00000002.2126409445.000000000A1B1000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2127699444.000000000A510000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429299081.0000000004CB2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2430521300.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2620860649.0000000004BEF000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621759813.00000000054E0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: RoboTaskLite.exe, 00000002.00000002.2126409445.000000000A1B1000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2127699444.000000000A510000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429299081.0000000004CB2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2430521300.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2620860649.0000000004BEF000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621759813.00000000054E0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\wix4\wix4\build\burn\Release\x86\burn.pdb> source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000002.2090864201.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000000.2054346331.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2088453134.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000000.2065684362.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2# source: ToolSecurityBvg.exe, 0000000B.00000003.2620322272.0000000000A72000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2610949855.0000000000A6F000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: winload_prod.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831z source: ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: hC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: [\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2>$ source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: vcruntime140.i386.pdb source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2089083492.000000006E581000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: vcruntime140.i386.pdbGCTL source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055144664.00000000033DF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055110721.00000000033DF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055023511.00000000033E8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2089083492.000000006E581000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2614575114.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2613692854.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2614575114.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2613692854.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: m\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Stateb source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2h source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2620322272.0000000000A72000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2610949855.0000000000A6F000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: a\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2x\NGL source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ]C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb?i% source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831w source: ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2614575114.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2613692854.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: i\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15Content-Length: 147Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 53Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 208Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531 HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/SSR-extension.af337c502c230a9902a8.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.55sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 100sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 4gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/web-worker.96ac23719317b1928681.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.55sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 100sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 4gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: workerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: OPTIONS /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveOrigin: https://business.bing.comAccess-Control-Request-Method: POSTAccess-Control-Request-Headers: content-typeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: POST /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveContent-Length: 472Content-Type: application/reports+jsonUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/vendors.bd02dd0f5f9b69ef8b17.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/microsoft.4fa8815283fe3d88a934.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common.bb241b5cf88a9a76514e.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/experience.e283502f48dd51b29357.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /statics/icons/favicon_newtabpage.png HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /crx/blobs/ASuc5ohcoRYyASTWkAI21BvR0f-Aos7pzgW3GtD8ImYoX-O9Pl77join3GT-5wpD1vT_nG6xpJ0eds7JOZacv0OYNfBAee3mKSnMDx3-YDnz3J7UxfHM_wfhsyHz9Z8rajAAxlKa5T9frrLlN0KHGfJRu7Y7NseNtZ_M/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_89_1_0.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /c.gif?rnd=1740954909934&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=6a55bf1828e8464ea291972ddf4f1e0f&activityId=6a55bf1828e8464ea291972ddf4f1e0f&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0 HTTP/1.1Host: c.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /b?rn=1740954909934&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=20D9FECD8DE260CF167EEB6E8CE561CF&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null HTTP/1.1Host: sb.scorecardresearch.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15Content-Length: 147Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: GET /b2?rn=1740954909934&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=20D9FECD8DE260CF167EEB6E8CE561CF&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null HTTP/1.1Host: sb.scorecardresearch.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: UID=1F96b0082b8d072a5b7ad781740954911; XID=1F96b0082b8d072a5b7ad781740954911 |
Source: global traffic | HTTP traffic detected: POST /OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1740954909932&time-delta-to-apply-millis=use-collector-delta&w=0&anoncknm=app_anon&NoResponseBody=true HTTP/1.1Host: browser.events.data.msn.comConnection: keep-aliveContent-Length: 3856sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-platform: "Windows"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Content-Type: text/plain;charset=UTF-8Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /c.gif?rnd=1740954909934&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=6a55bf1828e8464ea291972ddf4f1e0f&activityId=6a55bf1828e8464ea291972ddf4f1e0f&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0&ctsa=mr&CtsSyncId=6D056B75205D458CA69B91ED216D05CD&MUID=20D9FECD8DE260CF167EEB6E8CE561CF HTTP/1.1Host: c.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; SM=T |
Source: global traffic | HTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New+tab&enableForceCache=true HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 5.05sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 200sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 4gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; pglt-edgeChromium-dhp=547; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=16861926-2ddc-4702-a36c-35ea7be93a0e; ai_session=0N+5O3ePzPdTHz0TA32xEb|1740954909930|1740954909930; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z |
Source: global traffic | HTTP traffic detected: GET /edge/ntp/service-worker.js?bundles=latest&riverAgeMinutes=2880&navAgeMinutes=2880&networkTimeoutSeconds=5&bgTaskNetworkTimeoutSeconds=8&ssrBasePageNavAgeMinutes=360&enableEmptySectionRoute=true&enableNavPreload=true&enableFallbackVerticalsFeed=true&noCacheLayoutTemplates=true&cacheSSRBasePageResponse=true&enableStaticAdsRouting=true&enableWidgetsRegion=true HTTP/1.1Host: ntp.msn.comConnection: keep-aliveCache-Control: max-age=0Accept: */*Service-Worker: scriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-edge-ntp: {"back_block":0,"bg_cur":{"configIndex":36,"imageId":"BB1msKSj","provider":"CMSImage","userSelected":false},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"myFeed","show_greet":true,"vt_opened":false,"wpo_nx":{"v":"2","wgt":{"src":"default"}}}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: serviceworkerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; pglt-edgeChromium-dhp=547; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=16861926-2ddc-4702-a36c-35ea7be93a0e; ai_session=0N+5O3ePzPdTHz0TA32xEb|1740954909930|1740954909930; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z |
Source: global traffic | HTTP traffic detected: POST /OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1740954912705&w=0&anoncknm=app_anon&NoResponseBody=true HTTP/1.1Host: browser.events.data.msn.comConnection: keep-aliveContent-Length: 10959sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-platform: "Windows"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Content-Type: text/plain;charset=UTF-8Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; _C_ETH=1 |
Source: global traffic | HTTP traffic detected: POST /OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1740954912771&w=0&anoncknm=app_anon&NoResponseBody=true HTTP/1.1Host: browser.events.data.msn.comConnection: keep-aliveContent-Length: 4715sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-platform: "Windows"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Content-Type: text/plain;charset=UTF-8Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; _C_ETH=1 |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 53Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1740954913365&w=0&anoncknm=app_anon&NoResponseBody=true HTTP/1.1Host: browser.events.data.msn.comConnection: keep-aliveContent-Length: 5368sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-platform: "Windows"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Content-Type: text/plain;charset=UTF-8Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; msnup=%7B%22cnex%22%3A%22no%22%7D |
Source: global traffic | HTTP traffic detected: POST /OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1740954913824&w=0&anoncknm=app_anon&NoResponseBody=true HTTP/1.1Host: browser.events.data.msn.comConnection: keep-aliveContent-Length: 9573sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-platform: "Windows"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Content-Type: text/plain;charset=UTF-8Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; msnup=%7B%22cnex%22%3A%22no%22%7D |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 692817Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 745Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 212Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 380Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 22133Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 74041Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 35Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 694897Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 745Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 212Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 380Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 22133Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 74010Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: POST /aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGulQPXGH1mDhQ8vuituTWRuVRHCr5PFngH8fYg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15gm: DF8eH7uqeTtC4klPAjk/pXn1z5PtcIYA9z0JmzXFwrORTy+5LywCFzRF7uoL3y/I0oL0B4u/+T1hR/6vSiphp/7cIwh/l0YContent-Length: 35Host: piaktrip.online |
Source: global traffic | HTTP traffic detected: OPTIONS /api/report?cat=msn HTTP/1.1Host: deff.nelreports.netConnection: keep-aliveOrigin: https://assets.msn.comAccess-Control-Request-Method: POSTAccess-Control-Request-Headers: content-typeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: OPTIONS /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveOrigin: https://business.bing.comAccess-Control-Request-Method: POSTAccess-Control-Request-Headers: content-typeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: POST /api/report?cat=msn HTTP/1.1Host: deff.nelreports.netConnection: keep-aliveContent-Length: 1471Content-Type: application/reports+jsonUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: POST /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveContent-Length: 466Content-Type: application/reports+jsonUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531 HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/SSR-extension.af337c502c230a9902a8.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.55sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 100sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 4gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/web-worker.96ac23719317b1928681.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.55sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 100sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 4gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: workerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/vendors.bd02dd0f5f9b69ef8b17.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/microsoft.4fa8815283fe3d88a934.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common.bb241b5cf88a9a76514e.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /bundles/v1/edgeChromium/latest/experience.e283502f48dd51b29357.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /statics/icons/favicon_newtabpage.png HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /crx/blobs/ASuc5ohcoRYyASTWkAI21BvR0f-Aos7pzgW3GtD8ImYoX-O9Pl77join3GT-5wpD1vT_nG6xpJ0eds7JOZacv0OYNfBAee3mKSnMDx3-YDnz3J7UxfHM_wfhsyHz9Z8rajAAxlKa5T9frrLlN0KHGfJRu7Y7NseNtZ_M/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_89_1_0.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /c.gif?rnd=1740954909934&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=6a55bf1828e8464ea291972ddf4f1e0f&activityId=6a55bf1828e8464ea291972ddf4f1e0f&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0 HTTP/1.1Host: c.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1 |
Source: global traffic | HTTP traffic detected: GET /b?rn=1740954909934&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=20D9FECD8DE260CF167EEB6E8CE561CF&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null HTTP/1.1Host: sb.scorecardresearch.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8 |
Source: global traffic | HTTP traffic detected: GET /b2?rn=1740954909934&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=20D9FECD8DE260CF167EEB6E8CE561CF&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null HTTP/1.1Host: sb.scorecardresearch.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: UID=1F96b0082b8d072a5b7ad781740954911; XID=1F96b0082b8d072a5b7ad781740954911 |
Source: global traffic | HTTP traffic detected: GET /c.gif?rnd=1740954909934&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=6a55bf1828e8464ea291972ddf4f1e0f&activityId=6a55bf1828e8464ea291972ddf4f1e0f&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0&ctsa=mr&CtsSyncId=6D056B75205D458CA69B91ED216D05CD&MUID=20D9FECD8DE260CF167EEB6E8CE561CF HTTP/1.1Host: c.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; SM=T |
Source: global traffic | HTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New+tab&enableForceCache=true HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 5.05sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 200sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 4gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; pglt-edgeChromium-dhp=547; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=16861926-2ddc-4702-a36c-35ea7be93a0e; ai_session=0N+5O3ePzPdTHz0TA32xEb|1740954909930|1740954909930; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z |
Source: global traffic | HTTP traffic detected: GET /edge/ntp/service-worker.js?bundles=latest&riverAgeMinutes=2880&navAgeMinutes=2880&networkTimeoutSeconds=5&bgTaskNetworkTimeoutSeconds=8&ssrBasePageNavAgeMinutes=360&enableEmptySectionRoute=true&enableNavPreload=true&enableFallbackVerticalsFeed=true&noCacheLayoutTemplates=true&cacheSSRBasePageResponse=true&enableStaticAdsRouting=true&enableWidgetsRegion=true HTTP/1.1Host: ntp.msn.comConnection: keep-aliveCache-Control: max-age=0Accept: */*Service-Worker: scriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-edge-ntp: {"back_block":0,"bg_cur":{"configIndex":36,"imageId":"BB1msKSj","provider":"CMSImage","userSelected":false},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowPrivateTarget","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"myFeed","show_greet":true,"vt_opened":false,"wpo_nx":{"v":"2","wgt":{"src":"default"}}}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: serviceworkerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&startpage=1&PC=U531Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; pglt-edgeChromium-dhp=547; sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z; USRLOC=; MUID=20D9FECD8DE260CF167EEB6E8CE561CF; MUIDB=20D9FECD8DE260CF167EEB6E8CE561CF; _EDGE_S=F=1&SID=1F2195787EE6676B262C80DB7FC166C1; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=16861926-2ddc-4702-a36c-35ea7be93a0e; ai_session=0N+5O3ePzPdTHz0TA32xEb|1740954909930|1740954909930; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=8|RefA=6A55BF1828E8464EA291972DDF4F1E0F.RefC=2025-03-02T22:35:06Z |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | String found in binary or memory: http://appsyndication.org/2006/appsyn |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0# |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://e5.i.lencr.org/0A |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://e5.o.lencr.org0 |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0I |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0L |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0N |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0O |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://s.symcb.com/universal-root.crl0 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://s.symcd.com06 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://s1.symcb.com/pca3-g5.crl0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://s2.symcb.com0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcb.com/sv.crl0a |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcb.com/sv.crt0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://sv.symcd.com0& |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0( |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ts-ocsp.ws.symantec.com0; |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055144664.000000000342A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2090123059.000000000342A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2089656287.0000000005825000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055110721.00000000033DF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055023511.00000000033E8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2089009068.0000000004C60000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2088846583.00000000049B0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://wixtoolset.org/schemas/v4/2008/Burn |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2089009068.0000000004C60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://wixtoolset.org/schemas/v4/2008/BurnHd |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085622562.0000000000900000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085676238.0000000000900000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://wixtoolset.org/schemas/v4/BootstrapperApplicationData |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://wixtoolset.org/schemas/v4/BundleExtensionData |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000000.2385861414.00000001401E0000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://www.???.xx/?search=%s |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0 |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000000.2086419161.00000000005C0000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.geocities.com/SiliconValley/Network/2114/zipbeta.html |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009AC8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.0000000005016000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F48000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.info-zip.org/ |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft. |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000000.2086419161.00000000005C0000.00000002.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.robotask.com/ |
Source: RoboTaskLite.exe, 00000002.00000000.2086179373.0000000000401000.00000020.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.robotask.com/?ref=rtliteopenX5OP8O |
Source: RoboTaskLite.exe, 00000002.00000000.2086179373.0000000000401000.00000020.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.robotask.com/bugreport/ |
Source: RoboTaskLite.exe, 00000002.00000000.2086179373.0000000000401000.00000020.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.robotask.com/support/?ref=rtliteopen |
Source: RoboTaskLite.exe, 00000002.00000000.2086179373.0000000000401000.00000020.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.robotask.com/upgradefromlite/open |
Source: RoboTaskLite.exe, 00000002.00000000.2086179373.0000000000401000.00000020.00000001.01000000.00000007.sdmp | String found in binary or memory: http://www.robotask.com/upgradefromlite/openU |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000000.2385861414.00000001401E0000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://www.softwareok.com |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000000.2385861414.00000001401E0000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://www.softwareok.de |
Source: cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.surfok.de/ |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.symauth.com/cps0( |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.symauth.com/rpa00 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.vmware.com/0 |
Source: RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.vmware.com/0/ |
Source: RoboTaskLite.exe, 00000002.00000002.2128835893.0000000050051000.00000020.00000001.01000000.00000008.sdmp | String found in binary or memory: https://%s:%u/d.phpP |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FFF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com%22 |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/common-windows-widget-shared.ebe8f21260b7d79ff |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818104284.0000000008031000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/libs_ad-service_dist_NativeAdService_js-web-co |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/nurturing-placement-manager.fc7b7cad27260d2f6a |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/bundles/v1/edgeChromium/latest/weather-card-data-connector.c490877a0a3478ece4 |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://azureedge.net |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FFF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://bingretailmsndata.azureedge.net/msndata/ |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-strea |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://c.msn.com/c.gif?rnd=1740954909934&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&t |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://d.symcb.com/cps0% |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://d.symcb.com/rpa0 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://d.symcb.com/rpa0. |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ecs.nel.measure.office.net/api/report?TenantId=Edge&DestinationEndpoint=Edge-Prod-EWR30r4c&F |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light.png/1.7.1/asset |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light.png/1.7.1/assetMbP? |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light.png/1.7.1/assetet8f. |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_light.png/1.4.0/asset |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_light.png/1.4.0/asset/ |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_light.png/1.4.0/assetss |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2814478385.0000000007FFF000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FFF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ent-api.msn.com/%22 |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2818104284.0000000008031000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://msn.com |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2800745166.0000000008076000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2795733764.0000000008061000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/ |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2814478385.0000000007FFF000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FFF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/bundles/v1/edgeChromium/latest/web-worker.96ac23719317b1928681.js#lang=en-us&ads |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2865712524.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2801418332.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2818884502.0000000000AEC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&isFREModalBackground=1&start |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.comcache-control:public |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2817486043.0000000007FE1000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://ntp.msn.comreport-to: |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2552336986.000000000052A000.00000004.00000020.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2542810591.000000000052A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/ |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2552336986.000000000052A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online// |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2552336986.000000000052A000.00000004.00000020.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2542810591.000000000052A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/K |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2552336986.000000000052A000.00000004.00000020.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2542810591.000000000052A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/S |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2542810591.00000000004E9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/aofchic.htm?zbvekz9gzr=e2anLGjWQlfNlWSpiKPUZflc5Y%2FfWFlFyz44R65XekKGLN7kGul |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2552336986.000000000052A000.00000004.00000020.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2542810591.000000000052A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://piaktrip.online/o |
Source: RoboTaskLite.exe, 00000002.00000000.2086179373.0000000000401000.00000020.00000001.01000000.00000007.sdmp | String found in binary or memory: https://robotask.com/help/ |
Source: RoboTaskLite.exe, 00000002.00000000.2086179373.0000000000401000.00000020.00000001.01000000.00000007.sdmp | String found in binary or memory: https://robotask.com/openhelp/?id=%d.openSV |
Source: RoboTaskLite.exe, 00000002.00000003.2095163997.000000000A8DF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://sectigo.com/CPS0 |
Source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000003.2085426906.0000000000909000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2122047430.0000000009B1E000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2099974498.000000000A8D7000.00000004.00000001.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000003.2096226790.000000000A8DD000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429770178.000000000505F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621113380.0000000004F91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: ToolSecurityBvg.exe, 0000000B.00000003.2622760343.0000000000AF4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: unknown | Network traffic detected: HTTP traffic on port 50013 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50122 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50042 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50059 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50059 |
Source: unknown | Network traffic detected: HTTP traffic on port 50022 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50061 |
Source: unknown | Network traffic detected: HTTP traffic on port 50071 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50060 |
Source: unknown | Network traffic detected: HTTP traffic on port 49990 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50063 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50062 |
Source: unknown | Network traffic detected: HTTP traffic on port 50068 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49978 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50106 |
Source: unknown | Network traffic detected: HTTP traffic on port 50085 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50105 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50108 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50107 |
Source: unknown | Network traffic detected: HTTP traffic on port 50010 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50060 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50109 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50065 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50064 |
Source: unknown | Network traffic detected: HTTP traffic on port 50113 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50066 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50069 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50068 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50101 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50104 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50103 |
Source: unknown | Network traffic detected: HTTP traffic on port 50025 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50074 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50070 |
Source: unknown | Network traffic detected: HTTP traffic on port 50107 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50004 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50072 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50071 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50074 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50073 |
Source: unknown | Network traffic detected: HTTP traffic on port 49978 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50117 |
Source: unknown | Network traffic detected: HTTP traffic on port 50120 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50119 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50118 |
Source: unknown | Network traffic detected: HTTP traffic on port 50009 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50034 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50040 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50075 |
Source: unknown | Network traffic detected: HTTP traffic on port 49989 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50111 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50110 |
Source: unknown | Network traffic detected: HTTP traffic on port 50114 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50113 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50079 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50112 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50115 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50114 |
Source: unknown | Network traffic detected: HTTP traffic on port 50001 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50108 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50073 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50028 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50085 |
Source: unknown | Network traffic detected: HTTP traffic on port 50062 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50006 |
Source: unknown | Network traffic detected: HTTP traffic on port 50012 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50119 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50009 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50008 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50120 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50086 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50001 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50122 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50121 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50003 |
Source: unknown | Network traffic detected: HTTP traffic on port 49910 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50002 |
Source: unknown | Network traffic detected: HTTP traffic on port 50111 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50123 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50004 |
Source: unknown | Network traffic detected: HTTP traffic on port 50079 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50051 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50006 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50065 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50105 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50017 |
Source: unknown | Network traffic detected: HTTP traffic on port 50061 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50019 |
Source: unknown | Network traffic detected: HTTP traffic on port 50017 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50010 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50012 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50014 |
Source: unknown | Network traffic detected: HTTP traffic on port 50112 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50013 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50016 |
Source: unknown | Network traffic detected: HTTP traffic on port 50075 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50106 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50052 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50003 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50029 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49897 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50028 |
Source: unknown | Network traffic detected: HTTP traffic on port 50064 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50123 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50117 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50008 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50014 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50021 |
Source: unknown | Network traffic detected: HTTP traffic on port 50070 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50022 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50025 |
Source: unknown | Network traffic detected: HTTP traffic on port 49988 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50024 |
Source: unknown | Network traffic detected: HTTP traffic on port 49897 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50021 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50103 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50029 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50086 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49995 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50063 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50118 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50019 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50034 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50033 |
Source: unknown | Network traffic detected: HTTP traffic on port 50050 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50110 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50024 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50040 |
Source: unknown | Network traffic detected: HTTP traffic on port 50066 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50104 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49910 |
Source: unknown | Network traffic detected: HTTP traffic on port 50121 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49995 |
Source: unknown | Network traffic detected: HTTP traffic on port 50016 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50033 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49990 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50042 |
Source: unknown | Network traffic detected: HTTP traffic on port 50115 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50002 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50109 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50072 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50050 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50052 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50051 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49903 |
Source: unknown | Network traffic detected: HTTP traffic on port 49903 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49989 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49988 |
Source: unknown | Network traffic detected: HTTP traffic on port 50069 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50101 -> 443 |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Process created: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe "C:\Windows\TEMP\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe" -burn.clean.room="C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe" -burn.filehandle.attached=620 -burn.filehandle.self=632 | |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Process created: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe C:\Windows\TEMP\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Process created: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe "C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe" | |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default" | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=2124,i,16003338811107414363,9838939343670632493,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4388 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6988 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6936 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:8 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Process created: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe "C:\Windows\TEMP\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe" -burn.clean.room="C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe" -burn.filehandle.attached=620 -burn.filehandle.self=632 | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Process created: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe C:\Windows\TEMP\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Process created: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default" | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=2124,i,16003338811107414363,9838939343670632493,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4388 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6988 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6936 --field-trial-handle=2120,i,6787236163346224157,5306025125740223423,262144 /prefetch:8 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: msxml3.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: feclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: msxml3.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: feclient.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\Temp\{791D2BCF-ED73-43F0-9B7D-7127B95BFB3E}\.cr\SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: oledlg.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: pla.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: tdh.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: oledlg.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: pla.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: tdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: oledlg.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: pla.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: pdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: tdh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: shdocvw.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: | Binary string: D:\a\wix4\wix4\build\burn\Release\x86\burn.pdb source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000002.2090864201.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000000.2054346331.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2088453134.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000000.2065684362.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local StateT source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local StateC source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: lC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: RoboTaskLite.exe, 00000002.00000002.2126409445.000000000A1B1000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2127699444.000000000A510000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429299081.0000000004CB2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2430521300.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2620860649.0000000004BEF000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621759813.00000000054E0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: RoboTaskLite.exe, 00000002.00000002.2126409445.000000000A1B1000.00000004.00000020.00020000.00000000.sdmp, RoboTaskLite.exe, 00000002.00000002.2127699444.000000000A510000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2429299081.0000000004CB2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2430521300.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2620860649.0000000004BEF000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000009.00000002.2621759813.00000000054E0000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: D:\a\wix4\wix4\build\burn\Release\x86\burn.pdb> source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000002.2090864201.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000000.2054346331.0000000000BDE000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2088453134.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000000.2065684362.0000000000A5E000.00000002.00000001.01000000.00000005.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2# source: ToolSecurityBvg.exe, 0000000B.00000003.2620322272.0000000000A72000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2610949855.0000000000A6F000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: winload_prod.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831z source: ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: hC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: [\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2>$ source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: vcruntime140.i386.pdb source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2089083492.000000006E581000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: vcruntime140.i386.pdbGCTL source: SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055144664.00000000033DF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055110721.00000000033DF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000000.00000003.2055023511.00000000033E8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.17530.4675.11921.exe, 00000001.00000002.2089083492.000000006E581000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2614575114.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2613692854.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2614575114.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2613692854.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: m\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local Stateb source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2h source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2620322272.0000000000A72000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2610949855.0000000000A6F000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: a\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2x\NGL source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ]C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: ToolSecurityBvg.exe, 0000000B.00000003.2609423091.0000000000A8B000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2609609047.0000000000A65000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntkrnlmp.pdb?i% source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831w source: ToolSecurityBvg.exe, 0000000B.00000003.2622896001.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2614575114.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2606642707.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2607744908.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2613692854.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AA2000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: i\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State source: ToolSecurityBvg.exe, 0000000B.00000003.2608693465.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2612968488.0000000000AAA000.00000004.00000001.00020000.00000000.sdmp, ToolSecurityBvg.exe, 0000000B.00000003.2621346605.0000000000AD4000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryValueKey: Direct from: 0x7FF6887E3736 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688734EE3 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtTerminateProcess: Direct from: 0x7FF6887C98C1 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryValueKey: Direct from: 0x14011D93E | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtDeviceIoControlFile: Direct from: 0x7FF68884BAA2 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6888AB483 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688721E92 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Indirect: 0x14012000F | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF688942A0D | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF68872AF36 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF8C88A26A1 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Direct from: 0x7FF68894820A | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887217FC | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryVolumeInformationFile: Direct from: 0x7FF6887D2F87 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Direct from: 0x7FF6887CB116 | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF68886A13B | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Direct from: 0x7FF688818187 | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887288D2 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF68889CB4B | Jump to behavior |
Source: C:\Windows\Temp\{C862410A-D102-4DC3-B8E9-A8DBFE503D95}\.ba\RoboTaskLite.exe | NtProtectVirtualMemory: Direct from: 0x76EE7B2E | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryInformationProcess: Direct from: 0x7FF6887BCA1A | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | NtQuerySystemInformation: Direct from: 0x50CB3054 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF6888947D3 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x14011D808 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Direct from: 0x7FF68894821E | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationProcess: Direct from: 0x7FF6887CA8AD | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationProcess: Direct from: 0x7FF6887B731B | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtCreateFile: Direct from: 0x7FF688945D69 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688728DD1 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6888AD324 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtCreateThreadEx: Direct from: 0x7FF6888F8C78 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtCreateFile: Direct from: 0x7FF6887C4B37 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryInformationProcess: Direct from: 0x7FF688893C92 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF6888950F4 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887D2460 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryInformationProcess: Direct from: 0x7FF6887BD326 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtDelayExecution: Direct from: 0x7FF6888BD88C | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtMapViewOfSection: Direct from: 0x7FF6887AE176 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Direct from: 0x7FF68894822C | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688815BEF | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryValueKey: Direct from: 0x7FF6887E4443 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688714B32 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688865B79 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationProcess: Direct from: 0x7FF688894011 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6888980D1 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF68871E435 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688946FB7 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationProcess: Direct from: 0x7FF6887BEFD5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtMapViewOfSection: Direct from: 0x7FF688946B96 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Direct from: 0x7FF688945D87 | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryValueKey: Direct from: 0x7FF6887E4212 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryInformationProcess: Direct from: 0x7FF688892F3B | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688737589 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF688899CA7 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtMapViewOfSection: Direct from: 0x7FF6887ADFA6 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF68889A0DC | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtMapViewOfSection: Direct from: 0x7FF688770687 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtClose: Direct from: 0x14011D864 | |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtMapViewOfSection: Direct from: 0x7FF6887D8A04 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF68889F05F | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887DB253 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887C4C2F | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | NtProtectVirtualMemory: Direct from: 0x6CA4D411 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtDelayExecution: Direct from: 0x7FF6888C2206 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF688899C1A | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtOpenKeyEx: Direct from: 0x7FF6887B4365 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtCreateThreadEx: Direct from: 0x7FF688714F8B | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtCreateThreadEx: Direct from: 0x7FF688714DE2 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6888A22A3 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationProcess: Direct from: 0x7FF688893EFE | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationThread: Direct from: 0x7FF68895235F | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688811AA6 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryInformationProcess: Direct from: 0x7FF6887CAF0A | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887D62BD | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryInformationProcess: Direct from: 0x7FF6887BD482 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887DC35A | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadFile: Direct from: 0x14011D832 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtEnumerateValueKey: Direct from: 0x7FF688881AB4 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryInformationProcess: Direct from: 0x7FF68883FAB3 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688724454 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887C4677 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF8C88C4B5E | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadFile: Direct from: 0x7FF6887C4C8C | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF6888A505D | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationProcess: Direct from: 0x7FF6887B7857 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF688899A63 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtCreateFile: Direct from: 0x7FF6887BC81B | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtCreateFile: Direct from: 0x14011D7A4 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887BCD16 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtQueryValueKey: Direct from: 0x7FF6887E3843 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF688814641 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Supersync\RoboTaskLite.exe | NtProtectVirtualMemory: Direct from: 0x6CE42BB5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtDelayExecution: Direct from: 0x7FF6888CDF3A | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtSetInformationProcess: Direct from: 0x7FF6887CB63C | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF68872B3B9 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtDelayExecution: Direct from: 0x7FF6888C366B | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887DA9A2 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtReadVirtualMemory: Direct from: 0x7FF688894AF1 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x140120A3C | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6888A4FD5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ToolSecurityBvg.exe | NtAllocateVirtualMemory: Direct from: 0x7FF6887C671E | Jump to behavior |