Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://c.pki.goog/r/gsr1.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://c.pki.goog/r/r4.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://c.pki.goog/we2/64OUIVzpZV4.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0 |
Source: bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0? |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0? |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0= |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0 |
Source: bhv580C.tmp.5.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0 |
Source: file.exe, 00000000.00000003.1094567250.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1107339225.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101355104.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1094567250.00000000006C5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1094567250.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125807339.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526166454.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1094651755.00000000006F2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://geoplugin.net/json.gp |
Source: file.exe | String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: file.exe, 00000000.00000003.1102923180.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1094567250.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1107339225.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101355104.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125807339.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526166454.00000000006CC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpQ/ |
Source: file.exe, 00000000.00000003.1094567250.00000000006CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpl |
Source: file.exe, 00000000.00000003.1094567250.00000000006CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gplH/ |
Source: file.exe, 00000000.00000003.1094567250.0000000000700000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://geoplugin.net/json.gpv |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://i.pki.goog/gsr1.crt0- |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://i.pki.goog/r4.crt0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://i.pki.goog/we2.crt0 |
Source: file.exe, 00000000.00000003.1104132598.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://localhost:9222/json.G |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://o.pki.goog/we20% |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocsp.digicert.com0: |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocsp.digicert.com0Q |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocsp.msocsp.com0S |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://ocspx.digicert.com0E |
Source: bhv580C.tmp.5.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: http://www.digicert.com/CPS0~ |
Source: file.exe, 00000000.00000002.3528394499.0000000004180000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000007.00000002.1143124800.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 0000000A.00000002.1193069875.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.ebuddy.com |
Source: file.exe, 00000000.00000002.3528394499.0000000004180000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000007.00000003.1142913057.000000000352D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000007.00000002.1143124800.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 00000007.00000003.1138763037.000000000352D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000A.00000002.1193069875.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 0000000A.00000003.1192732097.00000000031CD000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000A.00000003.1192812095.00000000031CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.com |
Source: recover.exe, 00000007.00000003.1142913057.000000000352D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000007.00000003.1138763037.000000000352D000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000A.00000003.1192732097.00000000031CD000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 0000000A.00000003.1192812095.00000000031CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.imvu.comata |
Source: file.exe, 00000000.00000002.3528394499.0000000004180000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000007.00000002.1143124800.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 0000000A.00000002.1193069875.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com |
Source: file.exe, 00000000.00000002.3528394499.0000000004180000.00000040.10000000.00040000.00000000.sdmp, recover.exe, 00000007.00000002.1143124800.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 0000000A.00000002.1193069875.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.imvu.comr |
Source: recover.exe, 00000005.00000002.1184398832.0000000000754000.00000004.00000010.00020000.00000000.sdmp, recover.exe, 00000008.00000002.1205010228.0000000000C32000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net |
Source: recover.exe, 0000000A.00000002.1193069875.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: http://www.nirsoft.net/ |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8 |
Source: bhv580C.tmp.5.dr | String found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LO |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak |
Source: bhv580C.tmp.5.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp |
Source: bhv580C.tmp.5.dr | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://deff.nelreports.net/api/report?cat=msn |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a& |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEn |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw |
Source: file.exe, 00000000.00000003.1125807339.0000000000717000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.0000000000717000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.0000000000717000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: bhv580C.tmp.5.dr | String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com: |
Source: bhv580C.tmp.5.dr | String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033 |
Source: bhv580C.tmp.5.dr | String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live |
Source: recover.exe | String found in binary or memory: https://login.yahoo.com/config/login |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://maps.windows.com/windows-app-web-link |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-08-30-16/PreSignInSettingsConfig.json |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=13164f2a9ee6956f1439 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=b92552 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2 |
Source: file.exe, 00000000.00000003.1109342518.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101355104.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1108265714.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105765330.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526166454.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102923180.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101727594.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.0000000000700000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102158946.00000000006E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/ |
Source: file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105765330.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526166454.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102923180.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101727594.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102158946.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125807339.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com//i |
Source: file.exe, 00000000.00000003.1102558467.00000000006CC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exe |
Source: file.exe, 00000000.00000003.2190076108.00000000006F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105765330.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102923180.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101727594.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102158946.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125807339.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526553931.00000000006F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exe# |
Source: file.exe, 00000000.00000003.2190076108.00000000006F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105765330.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102923180.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101727594.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102158946.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125807339.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526553931.00000000006F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exe( |
Source: file.exe, 00000000.00000002.3525925643.000000000067E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exe.exe |
Source: file.exe, 00000000.00000003.2190076108.00000000006F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105765330.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102923180.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101727594.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102158946.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125807339.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526553931.00000000006F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exe? |
Source: file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exeL |
Source: file.exe, 00000000.00000002.3526166454.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1097731288.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exeP |
Source: file.exe, 00000000.00000003.2190076108.00000000006F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102558467.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105765330.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104132598.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1124770883.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1103577818.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1105337800.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1109342518.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102923180.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1101727594.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1104691268.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1102158946.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100945531.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125807339.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189765783.00000000006E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3526553931.00000000006F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/769eec76-38ee-469b-ae75-c9fdb78d6883/svhost.exeU |
Source: file.exe, 00000000.00000003.1099318256.00000000006E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ucarecdn.com/ptography |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59 |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: file.exe, 00000000.00000002.3528394499.0000000004180000.00000040.10000000.00040000.00000000.sdmp, recover.exe, recover.exe, 00000007.00000002.1143124800.0000000000400000.00000040.80000000.00040000.00000000.sdmp, recover.exe, 0000000A.00000002.1193069875.0000000000400000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: recover.exe | String found in binary or memory: https://www.google.com/accounts/servicelogin |
Source: bhv6CEC.tmp.8.dr, bhv580C.tmp.5.dr | String found in binary or memory: https://www.office.com/ |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042809D | 0_2_0042809D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0045412B | 0_2_0045412B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_004421C0 | 0_2_004421C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_004281D7 | 0_2_004281D7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043E1E0 | 0_2_0043E1E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041E29B | 0_2_0041E29B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_004373DA | 0_2_004373DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00438380 | 0_2_00438380 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00453472 | 0_2_00453472 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0042747E | 0_2_0042747E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043E43D | 0_2_0043E43D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_004325A1 | 0_2_004325A1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043774C | 0_2_0043774C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0041F809 | 0_2_0041F809 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_004379F6 | 0_2_004379F6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_004279F5 | 0_2_004279F5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0044DAD9 | 0_2_0044DAD9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00433C73 | 0_2_00433C73 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00413CA0 | 0_2_00413CA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00437CBD | 0_2_00437CBD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043DD82 | 0_2_0043DD82 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00435F52 | 0_2_00435F52 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00437F78 | 0_2_00437F78 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0043DFB1 | 0_2_0043DFB1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_041BB5C1 | 0_2_041BB5C1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_041C7194 | 0_2_041C7194 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_100012CB | 0_2_100012CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1000F1CE | 0_2_1000F1CE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10032287 | 0_2_10032287 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1000F3FD | 0_2_1000F3FD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1000B950 | 0_2_1000B950 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10009AD0 | 0_2_10009AD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1001FAEB | 0_2_1001FAEB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10013BD0 | 0_2_10013BD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_10009D40 | 0_2_10009D40 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_1001BF19 | 0_2_1001BF19 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044A030 | 5_2_0044A030 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0040612B | 5_2_0040612B |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0043E13D | 5_2_0043E13D |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044B188 | 5_2_0044B188 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00442273 | 5_2_00442273 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044D380 | 5_2_0044D380 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044A5F0 | 5_2_0044A5F0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_004125F6 | 5_2_004125F6 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_004065BF | 5_2_004065BF |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_004086CB | 5_2_004086CB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_004066BC | 5_2_004066BC |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044D760 | 5_2_0044D760 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00405A40 | 5_2_00405A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00449A40 | 5_2_00449A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00405AB1 | 5_2_00405AB1 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00405B22 | 5_2_00405B22 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044ABC0 | 5_2_0044ABC0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00405BB3 | 5_2_00405BB3 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00417C60 | 5_2_00417C60 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044CC70 | 5_2_0044CC70 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00418CC9 | 5_2_00418CC9 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044CDFB | 5_2_0044CDFB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044CDA0 | 5_2_0044CDA0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_0044AE20 | 5_2_0044AE20 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00415E3E | 5_2_00415E3E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 5_2_00437F3B | 5_2_00437F3B |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_00405038 | 6_2_00405038 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0041208C | 6_2_0041208C |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_004050A9 | 6_2_004050A9 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0040511A | 6_2_0040511A |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0043C13A | 6_2_0043C13A |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_004051AB | 6_2_004051AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_00449300 | 6_2_00449300 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0040D322 | 6_2_0040D322 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0044A4F0 | 6_2_0044A4F0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0043A5AB | 6_2_0043A5AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_00413631 | 6_2_00413631 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_00446690 | 6_2_00446690 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0044A730 | 6_2_0044A730 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_004398D8 | 6_2_004398D8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_004498E0 | 6_2_004498E0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0044A886 | 6_2_0044A886 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0043DA09 | 6_2_0043DA09 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_00438D5E | 6_2_00438D5E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_00449ED0 | 6_2_00449ED0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_0041FE83 | 6_2_0041FE83 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 6_2_00430F54 | 6_2_00430F54 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_004050C2 | 7_2_004050C2 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_004014AB | 7_2_004014AB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_00405133 | 7_2_00405133 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_004051A4 | 7_2_004051A4 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_00401246 | 7_2_00401246 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_0040CA46 | 7_2_0040CA46 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_00405235 | 7_2_00405235 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_004032C8 | 7_2_004032C8 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_00401689 | 7_2_00401689 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 7_2_00402F60 | 7_2_00402F60 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044A030 | 8_2_0044A030 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0040612B | 8_2_0040612B |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0043E13D | 8_2_0043E13D |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044B188 | 8_2_0044B188 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00442273 | 8_2_00442273 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044D380 | 8_2_0044D380 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044A5F0 | 8_2_0044A5F0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_004125F6 | 8_2_004125F6 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_004065BF | 8_2_004065BF |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_004086CB | 8_2_004086CB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_004066BC | 8_2_004066BC |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044D760 | 8_2_0044D760 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00405A40 | 8_2_00405A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00449A40 | 8_2_00449A40 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00405AB1 | 8_2_00405AB1 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00405B22 | 8_2_00405B22 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044ABC0 | 8_2_0044ABC0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00405BB3 | 8_2_00405BB3 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00417C60 | 8_2_00417C60 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044CC70 | 8_2_0044CC70 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00418CC9 | 8_2_00418CC9 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044CDFB | 8_2_0044CDFB |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044CDA0 | 8_2_0044CDA0 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_0044AE20 | 8_2_0044AE20 |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00415E3E | 8_2_00415E3E |
Source: C:\Windows\SysWOW64\recover.exe | Code function: 8_2_00437F3B | 8_2_00437F3B |
Source: file.exe, 00000000.00000003.1207192327.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207120382.0000000003EE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1126311531.00000000037DF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133055587.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133375299.0000000003FAD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1130449971.0000000003AA3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206511619.00000000038E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206749061.000000000383F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125361441.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528176811.0000000004070000.00000040.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000003.1207330519.0000000003E2F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: file.exe, 00000000.00000003.1207192327.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207120382.0000000003EE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1126311531.00000000037DF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133055587.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133375299.0000000003FAD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528018168.0000000003FB0000.00000040.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000003.1130449971.0000000003AA3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206511619.00000000038E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206749061.000000000383F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125361441.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528176811.0000000004070000.00000040.10000000.00040000.00000000.sdmp | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: file.exe, 00000000.00000003.1207192327.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207120382.0000000003EE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1126311531.00000000037DF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133055587.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133375299.0000000003FAD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1130449971.0000000003AA3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206511619.00000000038E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206749061.000000000383F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528176811.0000000004070000.00000040.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000003.1207330519.0000000003E2F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207258098.0000000003C78000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: file.exe, 00000000.00000003.1207192327.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207120382.0000000003EE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1126311531.00000000037DF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133055587.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133375299.0000000003FAD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1130449971.0000000003AA3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206511619.00000000038E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206749061.000000000383F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125361441.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528176811.0000000004070000.00000040.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000003.1207330519.0000000003E2F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: file.exe, 00000000.00000003.1207192327.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207120382.0000000003EE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1126311531.00000000037DF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133055587.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133375299.0000000003FAD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1130449971.0000000003AA3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206511619.00000000038E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206749061.000000000383F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528176811.0000000004070000.00000040.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000003.1207330519.0000000003E2F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207258098.0000000003C78000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: file.exe, 00000000.00000003.1207192327.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207120382.0000000003EE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1126311531.00000000037DF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133055587.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133375299.0000000003FAD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1130449971.0000000003AA3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206511619.00000000038E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206749061.000000000383F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528176811.0000000004070000.00000040.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000003.1207330519.0000000003E2F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207258098.0000000003C78000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: recover.exe, 00000005.00000003.1182045729.000000000302B000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000005.00000003.1181999310.000000000301A000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000008.00000003.1204257202.0000000004A1F000.00000004.00000020.00020000.00000000.sdmp, recover.exe, 00000008.00000003.1204374457.0000000004A2B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: file.exe, 00000000.00000003.1207192327.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1207120382.0000000003EE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1126311531.00000000037DF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133055587.0000000003D6A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1133375299.0000000003FAD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1130449971.0000000003AA3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206511619.00000000038E4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1206749061.000000000383F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1125361441.0000000002BE1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3528176811.0000000004070000.00000040.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000003.1207330519.0000000003E2F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default" | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --no-pre-read-main-dll --field-trial-handle=2016,i,5887734212717503347,3934441495540810161,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2060 /prefetch:3 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\iajtsrgsebxssztvpisvuwyvnh" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\svolskrusjpwcnhzgsfxxbteowblk" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\vxcelccngrhjftddqdrqiogvxctmlxvr" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\zgvoqthapwehbbwvasslabmm" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\kaiyjmsudewmdpszrdfelggvrby" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\mcorkecvrmorovgcbozgottmahirzjo" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default" | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1536 --field-trial-handle=1408,i,18324159308857574355,16848231625671550438,262144 --disable-features=PaintHolding /prefetch:3 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\iajtsrgsebxssztvpisvuwyvnh" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\svolskrusjpwcnhzgsfxxbteowblk" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\vxcelccngrhjftddqdrqiogvxctmlxvr" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\zgvoqthapwehbbwvasslabmm" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\kaiyjmsudewmdpszrdfelggvrby" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\mcorkecvrmorovgcbozgottmahirzjo" | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --no-pre-read-main-dll --field-trial-handle=2016,i,5887734212717503347,3934441495540810161,262144 --disable-features=PaintHolding --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2060 /prefetch:3 | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1536 --field-trial-handle=1408,i,18324159308857574355,16848231625671550438,262144 --disable-features=PaintHolding /prefetch:3 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: pstorec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\recover.exe | Section loaded: cryptbase.dll | Jump to behavior |