Click to jump to signature section
Source: zn7j8Etem5.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Joe Sandbox View | IP Address: 34.117.186.192 34.117.186.192 |
Source: Joe Sandbox View | IP Address: 34.117.186.192 34.117.186.192 |
Source: unknown | DNS query: name: ipinfo.io |
Source: unknown | DNS query: name: ipinfo.io |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioUser-Agent: Go-http-client/1.1Accept-Encoding: gzip |
Source: unknown | DNS traffic detected: queries for: ipinfo.io |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00010C000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ipinfo.iohttp/1.1Y |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00010C000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ipinfo.iohttp/1.1Yipinfo.io:80HTTP_PROYHTTP_PROXYHTTP_PROXYhttp_proxyHTTPS_PRNO_PROXYHTTPS_PR |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C000110000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C0001CC000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/missingauth |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/missingauthreflect.Value.SetMapIndex |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C00000E000.00000004.00001000.00020000.00000000.sdmp, system.txt.0.dr | String found in binary or memory: https://t.me/Planet_Stealer |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000310000.00000004.00001000.00020000.00000000.sdmp, CfBCRUfD.dat.0.dr, zmDmyEGJ.dat.0.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sxs.dll | Jump to behavior |
Source: classification engine | Classification label: mal52.spyw.winEXE@6/10@1/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6884:120:WilError_03 |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Windows\system32\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 | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C0000FA000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1691044965.000001CCB9EF5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT a11,a102 FROM nssPrivate; |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB); |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB); |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx)); |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check'); |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C0000FA000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000236000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000; |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q); |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB); |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C0002E7000.00000004.00001000.00020000.00000000.sdmp, zn7j8Etem5.exe, 00000000.00000003.1684758439.000001CCFFB25000.00000004.00000020.00020000.00000000.sdmp, rbmdPfoF.dat.0.dr | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: zn7j8Etem5.exe, 00000000.00000002.1689211391.000000C000236000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000;PRAGMA locking_mode = %s;PRAGMA locking_mode = NORMAL;PRAGMA synchronous = NORMAL;C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoC:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphC:\Users\user\AppData\Local\Temp\Cookies\chrome-default.txtC:\Users\user\AppData\Local\Temp\Cookies\chrome-default.txtC:\Users\user\AppData\Local\Temp\Cookies\chrome-default.txtsupport.microsoft.comTRUE/FALSE13340887735359381.AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuUN |
Source: zn7j8Etem5.exe, 00000000.00000002.1687761523.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cardsC:\Users\user\AppData\Local\Amigo\User DataC:\Users\user\AppData\Local\Torch\User DataC:\Users\user\AppData\Local\Vivaldi\User DataC:\Users\user\AppData\Local\Orbitum\User DataC:\Users\user\AppData\Local\Kometa\User DataC:\Users\user\AppData\Local\Iridium\User DataPRAGMA synchronous = NORMAL;;pData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release |
Source: zn7j8Etem5.exe, 00000000.00000002.1692240639.00007FF605E87000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode); |
Source: zn7j8Etem5.exe | Virustotal: Detection: 26% |
Source: unknown | Process created: C:\Users\user\Desktop\zn7j8Etem5.exe C:\Users\user\Desktop\zn7j8Etem5.exe | |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name | |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 | Jump to behavior |
Source: zn7j8Etem5.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: zn7j8Etem5.exe | Static file information: File size 5014528 > 1048576 |
Source: zn7j8Etem5.exe | Static PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x4c7c00 |
Source: zn7j8Etem5.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: zn7j8Etem5.exe, 00000000.00000002.1691115454.000001CCB9F38000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll::y |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\rbmdPfoF.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\TTCvZxwQ.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\CfBCRUfD.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\zmDmyEGJ.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\ioURllJb.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\y91ovJkV.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\EbEPnh3e.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Queries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Bookmarks | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\zn7j8Etem5.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: Yara match | File source: 00000000.00000002.1687761523.000000C000092000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: zn7j8Etem5.exe PID: 6856, type: MEMORYSTR |