Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00406A10 StrStrA,lstrlenA,LocalAlloc,CryptUnprotectData,LocalAlloc,LocalFree,lstrlenA, |
1_2_00406A10 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00410830 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,GetLastError,GetProcessHeap,HeapFree, |
1_2_00410830 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_0040A150 BCryptCloseAlgorithmProvider,BCryptDestroyKey,BCryptCloseAlgorithmProvider, |
1_2_0040A150 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00406CF0 LocalAlloc,BCryptDecrypt, |
1_2_00406CF0 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00406940 BCryptCloseAlgorithmProvider,BCryptDestroyKey, |
1_2_00406940 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_0040A560 StrCmpCA,BCryptCloseAlgorithmProvider,BCryptDestroyKey,BCryptCloseAlgorithmProvider,BCryptDestroyKey, |
1_2_0040A560 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00406980 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,BCryptCloseAlgorithmProvider,BCryptDestroyKey, |
1_2_00406980 |
Source: unknown |
HTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49720 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 23.197.127.21:443 -> 192.168.2.4:49730 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49733 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49752 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49753 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49754 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49755 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49759 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49760 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49761 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49782 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49783 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49784 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49786 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49787 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49788 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49791 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 94.130.189.58:443 -> 192.168.2.4:49792 version: TLS 1.2 |
Source: |
Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb source: Portals.exe |
Source: |
Binary string: System.Windows.Forms.pdb source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: Portals.pdb source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: System.Windows.Forms.pdbh source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: mscorlib.pdb source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: System.ni.pdbRSDS source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: mscorlib.ni.pdb source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: System.pdb) source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb<;V; H;_CorExeMainmscoree.dll source: Portals.exe |
Source: |
Binary string: mscorlib.ni.pdbRSDS source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: System.ni.pdb source: WER4DB2.tmp.dmp.4.dr |
Source: |
Binary string: System.pdb source: WER4DB2.tmp.dmp.4.dr |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00414E70 wsprintfA,FindFirstFileA,DeleteFileA,FindNextFileA,strlen,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,FindClose, |
1_2_00414E70 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00407210 ExpandEnvironmentStringsA,FindFirstFileA,FindNextFileA,strlen,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,CopyFileA,StrCmpCA,CopyFileA,Sleep,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,CopyFileA,DeleteFileA,StrCmpCA,memset,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,memset,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindClose, |
1_2_00407210 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_0040B6B0 FindFirstFileA,FindNextFileA,strlen,StrCmpCA,CopyFileA,Sleep,DeleteFileA,FindClose, |
1_2_0040B6B0 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00415EB0 SHGetFolderPathA,wsprintfA,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,strcpy,_splitpath,strcpy,strlen,isupper,wsprintfA,strcpy,strlen,SHFileOperationA,FindClose, |
1_2_00415EB0 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00408360 FindFirstFileA,CopyFileA,FindNextFileA,FindNextFileA,FindNextFileA,strlen,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,FindClose, |
1_2_00408360 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00413FD0 wsprintfA,FindFirstFileA,FindNextFileA,strlen,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindClose, |
1_2_00413FD0 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_004013F0 FindFirstFileA,FindClose,FindNextFileA,strlen,FindFirstFileA,DeleteFileA,FindNextFileA,CopyFileA,CopyFileA,DeleteFileA,FindClose, |
1_2_004013F0 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00413580 wsprintfA,FindFirstFileA,memset,memset,FindNextFileA,strlen,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcatA,strtok_s,SymMatchString,strtok_s,memset,lstrcatA,strtok_s,PathMatchSpecA,DeleteFileA,DeleteFileA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindClose, |
1_2_00413580 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_004097B0 FindFirstFileA,FindNextFileA,strlen,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA, |
1_2_004097B0 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_0040ACD0 wsprintfA,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,strlen,lstrlenA,DeleteFileA,CopyFileA,FindClose, |
1_2_0040ACD0 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00408C90 lstrcpyA,lstrcatA,FindFirstFileA,FindNextFileA,strlen,lstrcpyA,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcpyA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,CopyFileA,CopyFileA,CopyFileA,CopyFileA,CopyFileA,CopyFileA,CopyFileA,CopyFileA,CopyFileA,FindFirstFileA,FindNextFileA,strlen,lstrcpyA,lstrcatA,lstrcatA,lstrcatA,lstrcpyA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,FindClose,FindClose,DeleteFileA,_invalid_parameter_noinfo_noreturn, |
1_2_00408C90 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00414950 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,strlen,FindClose,lstrcatA,lstrcatA,lstrcatA,lstrlenA,lstrlenA, |
1_2_00414950 |
Source: C:\Users\user\Desktop\Portals.exe |
Code function: 1_2_00409560 ??2@YAPAXI@Z,??2@YAPAXI@Z,_invalid_parameter_noinfo_noreturn,FindFirstFileA,FindNextFileA,strlen,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA, |
1_2_00409560 |
Source: C:\Users\user\Desktop\Portals.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ |
Jump to behavior |
Source: C:\Users\user\Desktop\Portals.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ |
Jump to behavior |
Source: C:\Users\user\Desktop\Portals.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ |
Jump to behavior |
Source: C:\Users\user\Desktop\Portals.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ |
Jump to behavior |
Source: C:\Users\user\Desktop\Portals.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ |
Jump to behavior |
Source: C:\Users\user\Desktop\Portals.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ |
Jump to behavior |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49760 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2049087 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M1 : 192.168.2.4:49757 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859378 - Severity 1 - ETPRO MALWARE Win32/Stealc/Vidar Stealer Host Details Exfil (POST) M2 : 192.168.2.4:49754 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49759 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49762 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49762 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49761 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49761 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49785 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49785 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49763 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49763 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49786 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49786 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2051831 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 : 94.130.189.58:443 -> 192.168.2.4:49757 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49783 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49783 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 94.130.189.58:443 -> 192.168.2.4:49756 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49782 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49782 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49787 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49787 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49780 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49790 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49781 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49791 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2059331 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST M2 : 192.168.2.4:49784 -> 94.130.189.58:443 |
Source: Network traffic |
Suricata IDS: 2859636 - Severity 1 - ETPRO MALWARE Vidar/StealC CnC Exfil via SQL Database (POST) : 192.168.2.4:49784 -> 94.130.189.58:443 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.202.4.223 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 204.79.197.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.184.227 |
Source: global traffic |
HTTP traffic detected: GET /l793oy HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache |
Source: global traffic |
HTTP traffic detected: GET /profiles/76561199829660832 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache |
Source: global traffic |
HTTP traffic detected: GET /l793oy HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cacheCookie: stel_ssid=fe3759212eb16e0f84_2484407701162572427 |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0Host: b.b.goldenloafuae.comConnection: Keep-AliveCache-Control: no-cache |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEI0qDKAQig4coBCJWhywEInP7MAQiFoM0BCOipzgEIydHOAQi+1c4BCIHWzgEIwNjOAQjI3M4BCIrgzgEIruTOAQiL5c4BSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEI0qDKAQig4coBCJWhywEInP7MAQiFoM0BCOipzgEIydHOAQi+1c4BCIHWzgEIwNjOAQjI3M4BCIrgzgEIruTOAQiL5c4BSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9 |
Source: chrome.exe, 0000000D.00000002.1922074575.0000322C00A6D000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: %https://www.youtube.com/?feature=ytca equals www.youtube.com (Youtube) |
Source: chrome.exe, 0000000D.00000003.1842157625.0000322C01500000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: <!--_html_template_end_-->`}const FACEBOOK_APP_ID=738026486351791;class DoodleShareDialogElement extends CrLitElement{constructor(){super(...arguments);this.url={url:""}}static get is(){return"ntp-doodle-share-dialog"}static get styles(){return getCss$2()}render(){return getHtml$2.bind(this)()}static get properties(){return{title:{type:String},url:{type:Object}}}onFacebookClick_(){const url="https://www.facebook.com/dialog/share"+`?app_id=${FACEBOOK_APP_ID}`+`&href=${encodeURIComponent(this.url.url)}`+`&hashtag=${encodeURIComponent("#GoogleDoodle")}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kFacebook)}onTwitterClick_(){const url="https://twitter.com/intent/tweet"+`?text=${encodeURIComponent(`${this.title}\n${this.url.url}`)}`;WindowProxy.getInstance().open(url);this.notifyShare_(DoodleShareChannel.kTwitter)}onEmailClick_(){const url=`mailto:?subject=${encodeURIComponent(this.title)}`+`&body=${encodeURIComponent(this.url.url)}`;WindowProxy.getInstance().navigate(url);this.notifyShare_(DoodleShareChannel.kEmail)}onCopyClick_(){this.$.url.select();navigator.clipboard.writeText(this.url.url);this.notifyShare_(DoodleShareChannel.kLinkCopy)}onCloseClick_(){this.$.dialog.close()}notifyShare_(channel){this.fire("share",channel)}}customElements.define(DoodleShareDialogElement.is,DoodleShareDialogElement);let instance$3=null;function getCss$1(){return instance$3||(instance$3=[...[getCss$4()],css`:host{--ntp-logo-height:168px;display:flex;flex-direction:column;flex-shrink:0;justify-content:flex-end;min-height:var(--ntp-logo-height)}:host([doodle-boxed_]){justify-content:flex-end}#logo{forced-color-adjust:none;height:92px;width:272px}:host([single-colored]) #logo{-webkit-mask-image:url(icons/google_logo.svg);-webkit-mask-repeat:no-repeat;-webkit-mask-size:100%;background-color:var(--ntp-logo-color)}:host(:not([single-colored])) #logo{background-image:url(icons/google_logo.svg)}#imageDoodle{cursor:pointer;outline:0}#imageDoodle[tabindex='-1']{cursor:auto}:host([doodle-boxed_]) #imageDoodle{background-color:var(--ntp-logo-box-color);border-radius:20px;padding:16px 24px}:host-context(.focus-outline-visible) #imageDoodle:focus{box-shadow:0 0 0 2px rgba(var(--google-blue-600-rgb),.4)}#imageContainer{display:flex;height:fit-content;position:relative;width:fit-content}#image{max-height:var(--ntp-logo-height);max-width:100%}:host([doodle-boxed_]) #image{max-height:128px}#animation{height:100%;po |