Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: svchost.exe, 0000003D.00000002.2504316046.000001B6AE200000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: select.pyd.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digice |
Source: 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCer |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: 9afaXJv52z.exe, 00000002.00000002.1570103074.0000020DADA70000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.terminate |
Source: edb.log.61.dr | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADE66000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1555260305.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1570923303.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548074284.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://httpbin.org/post |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/json |
Source: 9afaXJv52z.exe, 00000002.00000003.1549987255.0000020DAD9A5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://json.org |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08F0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0N |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0O |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245483808.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: 9afaXJv52z.exe, 00000002.00000003.1549904859.0000020DAD92B000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1271340461.0000020DAD8B7000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1549821357.0000020DAD924000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1569662370.0000020DAD999000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1550963678.0000020DAD991000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548937201.0000020DAD8EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1557993230.0000020DAD997000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://python.org/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1261155792.0000020DADA11000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1261203092.0000020DAD8AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html |
Source: 9afaXJv52z.exe, 00000000.00000003.1249086752.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249717286.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250272952.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244115829.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244442453.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244809327.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1251123271.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244934313.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244562675.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245025869.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250812728.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245362425.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244016171.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245140379.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244644310.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1250672887.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1244334483.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1245247870.00000170C08E3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249826162.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: 9afaXJv52z.exe, 00000002.00000003.1562825975.0000020DADA5E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1549460513.0000020DAD9CF000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1271340461.0000020DADA56000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551519876.0000020DADA25000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1570067945.0000020DADA5F000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548937201.0000020DAD8EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551014490.0000020DAD9D0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1562091332.0000020DADA28000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6 |
Source: 9afaXJv52z.exe, 00000002.00000003.1261155792.0000020DADA11000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1262454309.0000020DAD8CF000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1261382928.0000020DAD8D8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1261203092.0000020DAD8AD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1262711651.0000020DAD8DA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html |
Source: 9afaXJv52z.exe, 00000002.00000003.1261155792.0000020DADA11000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1261203092.0000020DAD8AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://account.riotgames.com/api/account/v1/user |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.reddit.com/api/access_token |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.gofile.io/getServer |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/IPlayerService/GetOwnedGames/v1/?key=440D7F4D810EF9298D25EDDF37C1F902&s |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/IPlayerService/GetSteamLevel/v1/?key=440D7F4D810EF9298D25EDDF37C1F902&s |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ISteamUser/GetPlayerSummaries/v0002/?key=440D7F4D810EF9298D25EDDF37C1F9 |
Source: 9afaXJv52z.exe, 00000002.00000002.1571769421.0000020DADFC9000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543495098.0000020DADFC6000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADF4C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bugs.python.org/issue37179 |
Source: 9afaXJv52z.exe, 00000002.00000003.1552343432.0000020DAD769000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1261327304.0000020DAD769000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1549171884.0000020DAD701000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551387994.0000020DAD766000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1259331986.0000020DAD990000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1568839015.0000020DAD76A000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551325129.0000020DAD758000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1260666235.0000020DAD769000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1259547789.0000020DAD990000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1262607699.0000020DAD762000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1259614241.0000020DAD769000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1263149151.0000020DAD766000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bugs.python.org/issue42195. |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/avatars/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://cryptography.io |
Source: METADATA0.0.dr | String found in binary or memory: https://cryptography.io/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://cryptography.io/en/latest/changelog/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://cryptography.io/en/latest/installation/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://cryptography.io/en/latest/security/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v8/users/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/webhooks/1190831584878809150/43baozn0FAVEYDo8eF-XivB5Q0JQGjw6pMMgTYce34wCzvD |
Source: 9afaXJv52z.exe, 00000002.00000002.1571769421.0000020DADFC9000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543495098.0000020DADFC6000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADF4C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.aiohttp.org/en/stable/client_advanced.html#proxy-support |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-github-profile/customizi |
Source: 9afaXJv52z.exe, 00000002.00000003.1549904859.0000020DAD92B000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1271340461.0000020DAD8B7000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1549821357.0000020DAD924000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1561481044.0000020DAD994000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1550963678.0000020DAD991000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548937201.0000020DAD8EA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64 |
Source: 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADE66000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1555260305.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1570923303.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548074284.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.python.org/3/library/asyncio-eventloop.html |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://economy.roblox.com/v1/users/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://filepreviews.io/ |
Source: edb.log.61.dr | String found in binary or memory: https://g.live.com/odclientsettings/Prod1C: |
Source: svchost.exe, 0000003D.00000003.1380403426.000001B6AE040000.00000004.00000800.00020000.00000000.sdmp, edb.log.61.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV21C: |
Source: 9afaXJv52z.exe, 00000002.00000003.1559277843.0000020DAB99B000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1565010264.0000020DAB9B8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1258719819.0000020DAB9BB000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1552282326.0000020DAB99A000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1257221376.0000020DAD671000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1560322724.0000020DAB9B7000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1550721004.0000020DAB98A000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1258920487.0000020DAB9A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy |
Source: 9afaXJv52z.exe, 00000002.00000002.1571769421.0000020DADFC9000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543495098.0000020DADFC6000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADF4C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/aio-libs/aiohttp/discussions/6044 |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/microsoft/pyright/)). |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://github.com/pyca/cryptography |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://github.com/pyca/cryptography/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://github.com/pyca/cryptography/actions?query=workflow%3ACI |
Source: METADATA0.0.dr | String found in binary or memory: https://github.com/pyca/cryptography/issues |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246713889.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246388423.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246295929.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/blob/main/.github/CONTRIBUTING.md) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1068) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1079) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1081) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1084) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1085) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1090) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1092) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1099) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1105) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1107) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1117) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1120) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/1122) |
Source: 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADE66000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1555260305.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1571019109.0000020DADE86000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1558309573.0000020DADE85000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548074284.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/python-attrs/attrs/issues/136 |
Source: 9afaXJv52z.exe, 00000002.00000003.1549123706.0000020DADF16000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548074284.0000020DADEF6000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1571242400.0000020DADF18000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADEF6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/python-attrs/attrs/issues/251 |
Source: 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADE66000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1555260305.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1571019109.0000020DADE86000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1558309573.0000020DADE85000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548074284.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/python-attrs/attrs/issues/428 |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/issues/993) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246713889.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246388423.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246295929.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/python-attrs/attrs/wiki/Extensions-to-attrs) |
Source: 9afaXJv52z.exe, 00000002.00000002.1565167633.0000020DAD2B8000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688 |
Source: 9afaXJv52z.exe, 00000002.00000003.1258920487.0000020DAB9A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py |
Source: 9afaXJv52z.exe, 00000002.00000003.1559277843.0000020DAB99B000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1565010264.0000020DAB9B8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1258719819.0000020DAB9BB000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1552282326.0000020DAB99A000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1257221376.0000020DAD671000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1560322724.0000020DAB9B7000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1550721004.0000020DAB98A000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1258920487.0000020DAB9A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader |
Source: 9afaXJv52z.exe, 00000002.00000002.1571769421.0000020DADFC9000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543495098.0000020DADFC6000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADF4C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/python/cpython/pull/28073 |
Source: 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADF4C000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548453854.0000020DAE6D8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE27000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1556804989.0000020DAE6D8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/quicaxd/Exela-V2.0 |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/quicaxd/Exela-V2.0/Exela-V2.0 |
Source: METADATA.0.dr | String found in binary or memory: https://github.com/sponsors/hynek |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://github.com/sponsors/hynek). |
Source: 9afaXJv52z.exe, 00000002.00000003.1559277843.0000020DAB99B000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1565010264.0000020DAB9B8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1258719819.0000020DAB9BB000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1552282326.0000020DAB99A000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1257221376.0000020DAD671000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1560322724.0000020DAB9B7000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1550721004.0000020DAB98A000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1258920487.0000020DAB9A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py# |
Source: 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADF4C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gofile.io/d/VnJMg5) |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gql.twitch.tv/gql |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://hatch.pypa.io/latest/). |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://hynek.me/articles/import-attrs/) |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://i.hizliresim.com/8po0puy.jfif |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://i.hizliresim.com/eai9bwi.jpg |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://i.hizliresim.com/qxnzimj.jpg |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://i.instagram.com/api/v1/accounts/current_user/?edit=true |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://i.instagram.com/api/v1/users/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://img.shields.io/pypi/v/cryptography.svg |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://instagram.com/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1535135735.0000020DADFFE000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1557436843.0000020DAE007000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1557853052.0000020DAE012000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://mahler:8092/site-updates.py |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://mail.python.org/mailman/listinfo/cryptography-dev |
Source: 9afaXJv52z.exe, 00000002.00000003.1543296024.0000020DADF4C000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548453854.0000020DAE6D8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1556804989.0000020DAE6D8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://media.discordapp.net/attachments/1133692440029700117/1140245373496074270/195198d656ec1e2b59a |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://media.discordapp.net/attachments/1145679170127532095/1145756091553173696/3-min-5.jpg |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://oauth.reddit.com/api/v1/me |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://open.spotify.com/user/ |
Source: 9afaXJv52z.exe, 00000002.00000002.1568871055.0000020DAD770000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://peps.python.org/pep-0205/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246273602.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://peps.python.org/pep-0681/) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://pypi.org/project/attrs/) |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://pypi.org/project/cryptography/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/justforExela/injection/main/injection.js |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://raw.githubusercontent.com/python-attrs/attrs/main/.github/sponsors/FilePreviews.svg |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://raw.githubusercontent.com/python-attrs/attrs/main/.github/sponsors/Sentry.svg |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://raw.githubusercontent.com/python-attrs/attrs/main/.github/sponsors/Tidelift.svg |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://raw.githubusercontent.com/python-attrs/attrs/main/.github/sponsors/Variomedia.svg |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://raw.githubusercontent.com/python-attrs/attrs/main/docs/_static/attrs_logo.svg |
Source: 9afaXJv52z.exe, 00000000.00000003.1247744943.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr | String found in binary or memory: https://readthedocs.org/projects/cryptography/badge/?version=latest |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://sentry.io/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1246713889.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246388423.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246295929.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://stackoverflow.com/questions/tagged/python-attrs) |
Source: 9afaXJv52z.exe, 00000002.00000003.1362518016.0000020DB081F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: 9afaXJv52z.exe, 00000002.00000003.1362518016.0000020DB081F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/ExelaStealea |
Source: 9afaXJv52z.exe, 00000002.00000003.1556804989.0000020DAE6D8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/ExelaStealer |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/ExelaStealer---------------------- |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/ExelaStealer-------p |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.meZ |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://thumbnails.roblox.com/v1/users/avatar?userIds= |
Source: 9afaXJv52z.exe, 00000000.00000003.1246713889.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246388423.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246295929.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tidelift.com/subscripti |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://tidelift.com/subscription/pkg/pypi-attrs?utm_source=pypi-attrs&utm_medium=pypi |
Source: METADATA.0.dr | String found in binary or memory: https://tidelift.com/subscription/pkg/pypi-attrs?utm_source=pypi-attrs&utm_medium=referral&utm_campa |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tiktok.com/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://twitter.com |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://twitter.com/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://twitter.com/home |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://twitter.com/i/api/1.1/account/update_profile.json |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://webcast.tiktok.com/webcast/wallet_api/diamond_buy/permission/?aid=1988&app_language=de-DE&ap |
Source: 9afaXJv52z.exe, 00000000.00000003.1247580506.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.apache.org/licenses/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1247580506.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1247653162.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1247533508.00000170C08F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.apache.org/licenses/LICENSE-2.0 |
Source: METADATA.0.dr | String found in binary or memory: https://www.attrs.org/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/latest/glossary.html#term-dunder-methods)). |
Source: 9afaXJv52z.exe, 00000000.00000003.1246713889.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246388423.00000170C08EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246295929.00000170C08E8000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/latest/license.html) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/latest/names.html) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/stable/changelog.html |
Source: METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/stable/changelog.html) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/stable/comparison.html#customization) |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/stable/init.html#hooking-yourself-into-initialization). |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.attrs.org/en/stable/why.html#data-classes). |
Source: 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08F2000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1249389490.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: 9afaXJv52z.exe, 00000002.00000003.1362518016.0000020DB081F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP |
Source: 9afaXJv52z.exe, 00000002.00000002.1565399042.0000020DAD470000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1362518016.0000020DB081F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW |
Source: 9afaXJv52z.exe, 00000002.00000003.1362518016.0000020DB081F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d |
Source: 9afaXJv52z.exe, 00000002.00000003.1362518016.0000020DB081F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: 9afaXJv52z.exe, 00000002.00000003.1362518016.0000020DB081F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: 9afaXJv52z.exe, 00000000.00000003.1249492871.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.openssl.org/H |
Source: 9afaXJv52z.exe, 00000002.00000003.1535135735.0000020DADFFE000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1557436843.0000020DAE007000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1557853052.0000020DAE012000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.python.org/ |
Source: 9afaXJv52z.exe, 00000002.00000002.1565167633.0000020DAD230000.00000004.00001000.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1258773956.0000020DAD716000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.python.org/download/releases/2.3/mro/. |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.reddit.com/user/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.roblox.com/my/account/json |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.spotify.com/api/account-settings/v1/profile |
Source: 9afaXJv52z.exe, 00000002.00000003.1543162548.0000020DAE862000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548074284.0000020DADE73000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.tiktok.com/passport/web/account/info/?aid=1459&app_language=de-DE&app_name=tiktok_web&ba |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.twitch.tv/ |
Source: 9afaXJv52z.exe, 00000000.00000003.1246202289.00000170C08E5000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000000.00000003.1246151956.00000170C08EC000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr | String found in binary or memory: https://www.variomedia.de/ |
Source: 9afaXJv52z.exe, 00000002.00000003.1557790883.0000020DAD9D0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1549460513.0000020DAD9CF000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1271340461.0000020DAD8B7000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1569893970.0000020DAD9D0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1548937201.0000020DAD8EA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551014490.0000020DAD9D0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551721234.0000020DAD9D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://zopeinterface.readthedocs.io/en/latest/ |
Source: unknown | Process created: C:\Users\user\Desktop\9afaXJv52z.exe C:\Users\user\Desktop\9afaXJv52z.exe | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Users\user\Desktop\9afaXJv52z.exe C:\Users\user\Desktop\9afaXJv52z.exe | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer" | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "gdb --version" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get Manufacturer | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path Win32_ComputerSystem get Manufacturer | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe" | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"" | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\mshta.exe mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "chcp" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "chcp" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist /FO LIST | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Get-Clipboard | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config" | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profiles" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\systeminfo.exe systeminfo | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles | |
Source: C:\Windows\System32\systeminfo.exe | Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\HOSTNAME.EXE hostname | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic logicaldisk get caption,description,providername | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net user | |
Source: C:\Windows\System32\net.exe | Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\query.exe query user | |
Source: C:\Windows\System32\query.exe | Process created: C:\Windows\System32\quser.exe C:\Windows\system32\quser.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net localgroup | |
Source: C:\Windows\System32\net.exe | Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net localgroup administrators | |
Source: C:\Windows\System32\net.exe | Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup administrators | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net user guest | |
Source: C:\Windows\System32\attrib.exe | Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Users\user\Desktop\9afaXJv52z.exe C:\Users\user\Desktop\9afaXJv52z.exe | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "gdb --version" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "chcp" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profiles" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\9afaXJv52z.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get Manufacturer | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path Win32_ComputerSystem get Manufacturer | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\mshta.exe mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist /FO LIST | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Get-Clipboard | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\chcp.com chcp | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\systeminfo.exe systeminfo | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\HOSTNAME.EXE hostname | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic logicaldisk get caption,description,providername | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net user | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\query.exe query user | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net localgroup | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net localgroup administrators | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\net.exe net user guest | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles | |
Source: C:\Windows\System32\net.exe | Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user | |
Source: C:\Windows\System32\query.exe | Process created: C:\Windows\System32\quser.exe C:\Windows\system32\quser.exe | |
Source: C:\Windows\System32\net.exe | Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup | |
Source: C:\Windows\System32\net.exe | Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup administrators | |
Source: C:\Windows\System32\net.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\tasklist.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\mshta.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\tasklist.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\tasklist.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\systeminfo.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696492231n |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696492231} |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "vmwaretray.exe", # VMware |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "vboxservice.exe", # VirtualBox |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: *Hyper-V Administrators |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: self.banned_process = ["HTTP Toolkit.exe", "httpdebuggerui.exe","wireshark.exe", "fiddler.exe", "regedit.exe", "taskmgr.exe", "vboxservice.exe", "df5serv.exe", "processhacker.exe", "vboxtray.exe", "vmtoolsd.exe", "vmwaretray.exe", "ida64.exe", "ollydbg.exe", |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696492231s |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V Heartbeat Service |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: elif b"vmware" in stdout2.lower(): |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696492231x |
Source: 9afaXJv52z.exe, 00000002.00000003.1260081110.0000020DAD984000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1260386665.0000020DAD9A9000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1260254537.0000020DAD9B6000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551616914.0000020DAD9BB000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1261203092.0000020DAD995000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1262454309.0000020DAD995000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1260229804.0000020DAD9B1000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1551270748.0000020DAD9AA000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1260736387.0000020DAD9B6000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1549904859.0000020DAD92B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "vmsrvc.exe", # VirtualBox |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000002.1569004953.0000020DAD886000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1556526685.0000020DAD886000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V Volume Shadow Copy Requestor |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V Time Synchronization Service |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696492231^ |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696492231t |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11 |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696492231f |
Source: net1.exe, 00000048.00000002.1434077572.000001EDB3AE0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V Administrators |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696492231~ |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "vmtoolsd.exe", # VMware |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696492231x |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V PowerShell Direct Service |
Source: 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: return any(x.lower() in decoded_output[2].strip().lower() for x in ("virtualbox", "vmware")) |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696492231o |
Source: 9afaXJv52z.exe, 00000002.00000003.1534496021.0000020DAFE8D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538000317.0000020DAFE8E000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1541670912.0000020DAFEB0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1538128660.0000020DAFC62000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "vboxtray.exe", # VirtualBox |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V Data Exchange Service |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696492231u |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V Guest Shutdown Service |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V Guest Service Interface |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696492231t |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696492231x |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696492231] |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696492231d |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1540618183.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537760232.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1554432789.0000020DAF902000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1536704382.0000020DAF5C0000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1537609364.0000020DB0615000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546516598.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1539551063.0000020DAE78D000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp, 9afaXJv52z.exe, 00000002.00000003.1546405605.0000020DAF600000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DISPLAY_NAME: Hyper-V Remote Desktop Virtualization Service |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1560814948.0000020DB06E8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696492231 |
Source: 9afaXJv52z.exe, 00000002.00000003.1559016559.0000020DAE7CD000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 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 |