Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then jmp eax | 0_2_04DCF492 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_04DEACAE |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+1Ch] | 0_2_04DDFDF0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+0Ch] | 0_2_04DDFDF0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov word ptr [eax], dx | 0_2_04DD8FD0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ecx+04h] | 0_2_04DD8FD0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-76B691C0h] | 0_2_04DD8FD0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_04DF5F78 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp word ptr [edi+ebx], 0000h | 0_2_04E0D710 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-598BE2DCh] | 0_2_04DD20F1 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov dword ptr [esp+04h], ecx | 0_2_04DCD8E0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edi, byte ptr [esp+eax-3BEED3DEh] | 0_2_04DCD8E0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+30h] | 0_2_04DEE880 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+7306D3F8h] | 0_2_04DEE2A0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax-76B691C4h] | 0_2_04DEE2A0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx eax, byte ptr [esp+ecx+04h] | 0_2_04E0EB60 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [edx], al | 0_2_04DF4B5B |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx eax, byte ptr [edx+esi] | 0_2_04E0E340 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 0_2_04DC9CE0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 0_2_04DC9CE0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov ebp, eax | 0_2_04DC8480 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [esi], cl | 0_2_04DF441F |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_04DF0C0C |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-78B56C56h] | 0_2_04DE3C27 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ebx, byte ptr [esi+01h] | 0_2_04DC1C20 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, word ptr [eax] | 0_2_04DCEDCB |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [esi], cl | 0_2_04DF45F0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax] | 0_2_04E0EDD0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then jmp dword ptr [04E15274h] | 0_2_04DEF5AC |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov esi, eax | 0_2_04DF557A |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+eax-76B69200h] | 0_2_04DEDD76 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+eax-76B69200h] | 0_2_04DEDD71 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_04DE7520 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], BEB994C9h | 0_2_04DEDB16 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+eax-76B69200h] | 0_2_04DEDB16 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], BEB994C9h | 0_2_04DEDEA2 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+eax-76B69200h] | 0_2_04DEDEA2 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [ebp+00h], al | 0_2_04DE1E4A |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [ebp+00h], al | 0_2_04DE1E4A |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then lea ecx, dword ptr [esp+7Ch] | 0_2_04DDB635 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then lea ecx, dword ptr [esp+7Ch] | 0_2_04DDB635 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edi, byte ptr [ecx+esi] | 0_2_04DC1FF0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp dword ptr [ebp-14h], 00000000h | 0_2_04DEDFEE |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ebx-7FFFFFFFh] | 0_2_04E0DF90 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-3589894Ch] | 0_2_04DD0F55 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movsx ecx, byte ptr [esi+eax] | 0_2_04DCAF50 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_04DF5F7C |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], BEB994C9h | 0_2_04DEFF6E |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movsx eax, byte ptr [esi+ecx] | 0_2_04DD8F10 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, byte ptr [esp+edi-73D703B8h] | 0_2_04DD1708 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax] | 0_2_04DECF05 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax] | 0_2_04DECF05 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+08h] | 0_2_04DE309C |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp word ptr [ecx+edx], 0000h | 0_2_04DE309C |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov word ptr [edx], cx | 0_2_04DE309C |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+1933412Ah] | 0_2_04DEE8A0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+edx+18h] | 0_2_04DD0073 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-00000096h] | 0_2_04DCC830 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+eax-0000077Dh] | 0_2_04DCC830 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx ebx, byte ptr [eax+esi] | 0_2_04DCC830 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax-76B69194h] | 0_2_04DF01D5 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov dword ptr [esp+0Ch], eax | 0_2_04DE8180 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 0_2_04DF21B0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+00000704h] | 0_2_04DDF17C |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov ecx, eax | 0_2_04E0B120 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], BEB994C9h | 0_2_04E0B120 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [edx], al | 0_2_04DF5134 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov byte ptr [edx], al | 0_2_04DF5122 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov esi, eax | 0_2_04DF5AFA |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_04DDAB94 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], BEB994C9h | 0_2_04DE7BB0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edi, byte ptr [esi+ebx] | 0_2_04DF0332 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then push ebx | 0_2_04E03B10 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax+04h] | 0_2_04E03B10 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], BEB994C9h | 0_2_04DF0B2D |
Source: C:\Users\user\Desktop\activate.exe | Code function: 4x nop then movzx edi, byte ptr [ebp+eax-76B69244h] | 0_2_04DF0B2D |
Source: activate.exe | String found in binary or memory: http://Mozilla/5.0GET |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: activate.exe | String found in binary or memory: http://lame.sf.net |
Source: activate.exe | String found in binary or memory: http://lame.sf.net32bits |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: powershell.exe, 00000002.00000002.1631547725.0000000004891000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: activate.exe | String found in binary or memory: http://www.brynosaurus.com/cachedir/ |
Source: activate.exe | String found in binary or memory: http://www.gnu.org/licenses/ |
Source: activate.exe | String found in binary or memory: http://www.openssl.org/support/faq.html |
Source: activate.exe | String found in binary or memory: http://www.openssl.org/support/faq.htmlRAND |
Source: activate.exe | String found in binary or memory: http://www.twolame.org |
Source: activate.exe | String found in binary or memory: http://www.videolan.org/x264.html |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: activate.exe, 00000000.00000003.1532592754.000000000653D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: activate.exe | String found in binary or memory: http://xavs.sourceforge.net |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org?q= |
Source: powershell.exe, 00000002.00000002.1631547725.0000000004891000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore6lB |
Source: activate.exe, 00000000.00000003.1549358462.0000000002A71000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: activate.exe, 00000000.00000003.1549358462.0000000002A71000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: activate.exe, 00000000.00000003.1549358462.0000000002A71000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: activate.exe, 00000000.00000003.1549358462.0000000002A71000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtabv209h |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gemini.google.com/app?q= |
Source: activate.exe, 00000000.00000003.1549358462.0000000002A71000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: activate.exe, 00000000.00000003.2216013982.0000000002A09000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215624710.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215907026.00000000029F8000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000002.3178041253.0000000002A0A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/ |
Source: activate.exe, 00000000.00000003.2216013982.0000000002A09000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215624710.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215907026.00000000029F8000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000002.3178041253.0000000002A0A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/; |
Source: activate.exe, 00000000.00000003.2216013982.0000000002A09000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215624710.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215907026.00000000029F8000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000002.3178041253.0000000002A0A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/ed |
Source: activate.exe, 00000000.00000002.3178104437.0000000002A6E000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215965048.0000000002A6D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/raw/yKBa |
Source: activate.exe, 00000000.00000002.3178104437.0000000002A4F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/raw/yKBaQkD9 |
Source: activate.exe, 00000000.00000002.3178104437.0000000002A6E000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215965048.0000000002A6D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/raw/yKBae |
Source: activate.exe, 00000000.00000003.2215839964.00000000029D3000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000002.3177826665.00000000029D5000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215752026.00000000029D2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com:443/raw/yKBaQkD9osoft |
Source: activate.exe, 00000000.00000003.2216013982.0000000002A09000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1600844211.0000000002A0A000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215624710.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215907026.00000000029F8000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000002.3178041253.0000000002A0A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run/ |
Source: activate.exe, 00000000.00000002.3177722701.00000000029BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run/1 |
Source: activate.exe, 00000000.00000003.1576557882.0000000002A0A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run/G |
Source: activate.exe, 00000000.00000003.1576557882.0000000002A0A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run/U |
Source: activate.exe, 00000000.00000002.3178104437.0000000002A4F000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1532493381.0000000006440000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run/pzaw |
Source: activate.exe, 00000000.00000003.1532035112.000000000643C000.00000004.00000800.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1531844436.0000000006435000.00000004.00000800.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1532493381.0000000006440000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run/pzaw# |
Source: activate.exe, 00000000.00000003.1576141574.0000000002A42000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run/pzawSta |
Source: activate.exe, 00000000.00000003.1500619485.00000000029D2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run:443/pzaw |
Source: activate.exe, 00000000.00000003.1576398626.00000000029D2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://revitmodh.run:443/pzawal |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: activate.exe, 00000000.00000003.1549358462.0000000002A71000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: activate.exe, 00000000.00000003.1549358462.0000000002A71000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/v20 |
Source: activate.exe, 00000000.00000003.1506328943.0000000006448000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6 |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: activate.exe, 00000000.00000003.1537659355.0000000006750000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_061611E0 | 0_2_061611E0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_02F10575 | 0_2_02F10575 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_02F10000 | 0_2_02F10000 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DDFDF0 | 0_2_04DDFDF0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E06640 | 0_2_04E06640 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD8FD0 | 0_2_04DD8FD0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DC38C0 | 0_2_04DC38C0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCD8E0 | 0_2_04DCD8E0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCF0AE | 0_2_04DCF0AE |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0D820 | 0_2_04E0D820 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DEE2A0 | 0_2_04DEE2A0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE6AA0 | 0_2_04DE6AA0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E02A40 | 0_2_04E02A40 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DEA260 | 0_2_04DEA260 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCB3E0 | 0_2_04DCB3E0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD4B59 | 0_2_04DD4B59 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF4B5B | 0_2_04DF4B5B |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0E340 | 0_2_04E0E340 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD5B20 | 0_2_04DD5B20 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DC9CE0 | 0_2_04DC9CE0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DC8480 | 0_2_04DC8480 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD345D | 0_2_04DD345D |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0DC70 | 0_2_04E0DC70 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF441F | 0_2_04DF441F |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE5DC0 | 0_2_04DE5DC0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF45F0 | 0_2_04DF45F0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF4DEE | 0_2_04DF4DEE |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DDD553 | 0_2_04DDD553 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF557A | 0_2_04DF557A |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DDED7A | 0_2_04DDED7A |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD3D1E | 0_2_04DD3D1E |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0AD00 | 0_2_04E0AD00 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE4530 | 0_2_04DE4530 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE7520 | 0_2_04DE7520 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DFAED0 | 0_2_04DFAED0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF3ED0 | 0_2_04DF3ED0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCA6E0 | 0_2_04DCA6E0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE96E0 | 0_2_04DE96E0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0B670 | 0_2_04E0B670 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE1E4A | 0_2_04DE1E4A |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E01E30 | 0_2_04E01E30 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCF600 | 0_2_04DCF600 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE3620 | 0_2_04DE3620 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DC7790 | 0_2_04DC7790 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DDCF8C | 0_2_04DDCF8C |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0DF90 | 0_2_04E0DF90 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD07A0 | 0_2_04DD07A0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE174F | 0_2_04DE174F |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DC8F10 | 0_2_04DC8F10 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DC2F20 | 0_2_04DC2F20 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCC0D0 | 0_2_04DCC0D0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E070F0 | 0_2_04E070F0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE4080 | 0_2_04DE4080 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DFD0B0 | 0_2_04DFD0B0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E02090 | 0_2_04E02090 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF7010 | 0_2_04DF7010 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCC830 | 0_2_04DCC830 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DEB9C0 | 0_2_04DEB9C0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE59FA | 0_2_04DE59FA |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0D1D0 | 0_2_04E0D1D0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DC8990 | 0_2_04DC8990 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DCB990 | 0_2_04DCB990 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E0B120 | 0_2_04E0B120 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF5134 | 0_2_04DF5134 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DF5122 | 0_2_04DF5122 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD526B | 0_2_04DD526B |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DD2A00 | 0_2_04DD2A00 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DDAB94 | 0_2_04DDAB94 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DE7BB0 | 0_2_04DE7BB0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DFABB0 | 0_2_04DFABB0 |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04DEBB6A | 0_2_04DEBB6A |
Source: C:\Users\user\Desktop\activate.exe | Code function: 0_2_04E03B10 | 0_2_04E03B10 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 2_2_00B00E70 | 2_2_00B00E70 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 2_2_00B01338 | 2_2_00B01338 |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 2_2_00B0170D | 2_2_00B0170D |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Code function: 2_2_00B0136A | 2_2_00B0136A |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: quserex.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006538000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: - GDCDYNVMware20,11696428655p |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: activate.exe, 00000000.00000003.1600844211.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1563568803.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1576398626.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1601158140.00000000029F6000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215624710.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000002.3177826665.00000000029FA000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.2215907026.00000000029F8000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1577563370.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1563691895.00000000029F6000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1500540779.00000000029F0000.00000004.00000020.00020000.00000000.sdmp, activate.exe, 00000000.00000003.1576635382.00000000029F6000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: activate.exe | Binary or memory string: xvmcidct |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: activate.exe | Binary or memory string: d->log2_chroma_h <= 3d->nb_components <= 4d->name && d->name[0](d->nb_components==4 || d->nb_components==2) == !!(d->flags & (1 << 7))!c->plane && !c->step_minus1 && !c->offset_plus1 && !c->shift && !c->depth_minus1c->step_minus1 >= c->depth_minus18*(c->step_minus1+1) >= c->depth_minus1+1bayer_tmp[0] == 0 && tmp[1] == 0beyuv420pyuyv422rgb24bgr24yuv422pyuv444pyuv410pyuv411pgraymonowmonobpal8yuvj420pyuvj422pyuvj444pxvmcmcxvmcidctuyvy422uyyvyy411bgr8bgr4bgr4_bytergb8rgb4rgb4_bytenv12nv21argbabgrgray16begray16leyuv440pyuvj440pyuva420pvdpau_h264vdpau_mpeg1vdpau_mpeg2vdpau_wmv3vdpau_vc1rgb48bergb48lergb565bergb565lergb555bergb555lebgr565bebgr565lebgr555bebgr555levaapi_mocovaapi_idctvaapi_vldyuv420p16leyuv420p16beyuv422p16leyuv422p16beyuv444p16leyuv444p16bevdpau_mpeg4dxva2_vldrgb444lergb444bebgr444lebgr444begray8abgr48bebgr48leyuv420p9beyuv420p9leyuv420p10beyuv420p10leyuv422p10beyuv422p10leyuv444p9beyuv444p9leyuv444p10beyuv444p10leyuv422p9beyuv422p9levda_vldgbrpgbrp9begbrp9legbrp10begbrp10legbrp16begbrp16leyuva420p9beyuva420p9leyuva422p9beyuva422p9leyuva444p9beyuva444p9leyuva420p10beyuva420p10leyuva422p10beyuva422p10leyuva444p10beyuva444p10leyuva420p16beyuva420p16leyuva422p16beyuva422p16leyuva444p16beyuva444p16levdpauxyz12lexyz12benv16nv20lenv20beyvyu422rgba64bergba64lebgra64bebgra64le0rgbrgb00bgrbgr0yuva444pyuva422pyuv420p12beyuv420p12leyuv420p14beyuv420p14leyuv422p12beyuv422p12leyuv422p14beyuv422p14leyuv444p12beyuv444p12leyuv444p14beyuv444p14legbrp12begbrp12legbrp14begbrp14legbrapgbrap16begbrap16leyuvj411pbayer_bggr8bayer_rggb8bayer_gbrg8bayer_grbg8bayer_bggr16lebayer_bggr16bebayer_rggb16lebayer_rggb16bebayer_gbrg16lebayer_gbrg16bebayer_grbg16lebayer_grbg16beO |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: activate.exe, 00000000.00000002.3177722701.00000000029BF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW@ |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: activate.exe | Binary or memory string: VMware Screen Codec / VMware Video |
Source: activate.exe | Binary or memory string: BxvmncVMware Screen Codec / VMware Videointerlacing not supported |
Source: activate.exe, 00000000.00000003.1520257805.0000000006533000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pdliaogehgdbhbnmkklieghmmjkpigpa | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\activate.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |