Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.172.94.66 |
Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.a.0/sTy |
Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.a.0/sTyN |
Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.adobe.c.0/ti |
Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.adobe.c.0/tiA |
Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.adobe.hotosh |
Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.adobe.hotoshN |
Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.adoraw-se |
Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.adoraw-seN |
Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.photo/ |
Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ns.photo/N |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/ |
Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/( |
Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.orga |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: file.exe, 00000000.00000003.2334175402.0000012A22188000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334175402.0000012A22190000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334891313.0000012A2444A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335276853.0000012A22078000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org |
Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: file.exe, 00000000.00000003.2337982467.0000012A251A9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335627750.0000012A22055000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334175402.0000012A22190000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334891313.0000012A2444A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335276853.0000012A22078000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: file.exe, 00000000.00000003.2334175402.0000012A22188000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org# |
Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle |
Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ |
Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E6060 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize, | 0_2_0000012A222E6060 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A223376D0 NtAllocateVirtualMemory,LdrEnumerateLoadedModules, | 0_2_0000012A223376D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A223376C0 NtQuerySystemInformation, | 0_2_0000012A223376C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E5920 GetModuleHandleA,GetProcAddress,OpenProcess,NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle, | 0_2_0000012A222E5920 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DD190 RtlCreateUnicodeString,RtlCreateUnicodeString,AddVectoredExceptionHandler,HeapAlloc,NtGetContextThread,NtOpenSection,NtContinue,RtlFreeHeap,LoadLibraryExW,RemoveVectoredExceptionHandler, | 0_2_00007FF7A44DD190 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44EA200 RtlAdjustPrivilege,RtlAdjustPrivilege,NtRaiseHardError,NtRaiseHardError, | 0_2_00007FF7A44EA200 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DCE20 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection, | 0_2_00007FF7A44DCE20 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DC9F0 RtlCompareUnicodeString,NtContinue,NtQueryObject,NtContinue,RtlCompareUnicodeString,RtlCompareUnicodeString,NtContinue,HeapAlloc,NtGetContextThread,NtMapViewOfSection,NtContinue,RtlFreeHeap,NtMapViewOfSection,NtContinue,NtContinue,NtContinue,NtContinue,HeapAlloc,NtGetContextThread,NtClose,NtContinue,RtlFreeHeap,NtClose,NtContinue,NtContinue,NtContinue,NtContinue,NtContinue, | 0_2_00007FF7A44DC9F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F8E40 | 0_2_0000012A222F8E40 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E8F60 | 0_2_0000012A222E8F60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222FEFBC | 0_2_0000012A222FEFBC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E0CC0 | 0_2_0000012A222E0CC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2229CDE0 | 0_2_0000012A2229CDE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222C3210 | 0_2_0000012A222C3210 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E2240 | 0_2_0000012A222E2240 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A223022FC | 0_2_0000012A223022FC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22297350 | 0_2_0000012A22297350 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2229F060 | 0_2_0000012A2229F060 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E3040 | 0_2_0000012A222E3040 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22291130 | 0_2_0000012A22291130 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2231B76C | 0_2_0000012A2231B76C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222A43F0 | 0_2_0000012A222A43F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E0480 | 0_2_0000012A222E0480 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E8578 | 0_2_0000012A222E8578 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E1580 | 0_2_0000012A222E1580 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E3A60 | 0_2_0000012A222E3A60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222EAAE0 | 0_2_0000012A222EAAE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22291820 | 0_2_0000012A22291820 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222DA8F0 | 0_2_0000012A222DA8F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2229D930 | 0_2_0000012A2229D930 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2229E9C0 | 0_2_0000012A2229E9C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22291E50 | 0_2_0000012A22291E50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22299E39 | 0_2_0000012A22299E39 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2230AE2C | 0_2_0000012A2230AE2C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22305EC4 | 0_2_0000012A22305EC4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D1EB0 | 0_2_0000012A222D1EB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222ACF20 | 0_2_0000012A222ACF20 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222CEF60 | 0_2_0000012A222CEF60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2231DF80 | 0_2_0000012A2231DF80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222CDFC0 | 0_2_0000012A222CDFC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222CEC30 | 0_2_0000012A222CEC30 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222FFC34 | 0_2_0000012A222FFC34 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D0D50 | 0_2_0000012A222D0D50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D6D60 | 0_2_0000012A222D6D60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F6D5C | 0_2_0000012A222F6D5C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222BCD2D | 0_2_0000012A222BCD2D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222BB290 | 0_2_0000012A222BB290 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222922AE | 0_2_0000012A222922AE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222982B0 | 0_2_0000012A222982B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222CE2C0 | 0_2_0000012A222CE2C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222B7300 | 0_2_0000012A222B7300 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2229C300 | 0_2_0000012A2229C300 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D2360 | 0_2_0000012A222D2360 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F6344 | 0_2_0000012A222F6344 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2230B398 | 0_2_0000012A2230B398 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22267010 | 0_2_0000012A22267010 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22323010 | 0_2_0000012A22323010 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E6060 | 0_2_0000012A222E6060 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A223000E4 | 0_2_0000012A223000E4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222660C0 | 0_2_0000012A222660C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F70EC | 0_2_0000012A222F70EC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222B0189 | 0_2_0000012A222B0189 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A223011E4 | 0_2_0000012A223011E4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2229B1E0 | 0_2_0000012A2229B1E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222ED60A | 0_2_0000012A222ED60A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F75F4 | 0_2_0000012A222F75F4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222CE5F0 | 0_2_0000012A222CE5F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222CA660 | 0_2_0000012A222CA660 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22306634 | 0_2_0000012A22306634 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F263C | 0_2_0000012A222F263C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F6714 | 0_2_0000012A222F6714 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22300764 | 0_2_0000012A22300764 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222AE7A9 | 0_2_0000012A222AE7A9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A223097C4 | 0_2_0000012A223097C4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A2231E400 | 0_2_0000012A2231E400 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222E6460 | 0_2_0000012A222E6460 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D8490 | 0_2_0000012A222D8490 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22266480 | 0_2_0000012A22266480 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D4520 | 0_2_0000012A222D4520 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F652C | 0_2_0000012A222F652C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22302578 | 0_2_0000012A22302578 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222C65D0 | 0_2_0000012A222C65D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222FA5CC | 0_2_0000012A222FA5CC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222DE9F3 | 0_2_0000012A222DE9F3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22287A00 | 0_2_0000012A22287A00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F4A50 | 0_2_0000012A222F4A50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22302B00 | 0_2_0000012A22302B00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22307B08 | 0_2_0000012A22307B08 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222F2B34 | 0_2_0000012A222F2B34 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D1B80 | 0_2_0000012A222D1B80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222D9BD0 | 0_2_0000012A222D9BD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222DC840 | 0_2_0000012A222DC840 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222AC870 | 0_2_0000012A222AC870 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222CE910 | 0_2_0000012A222CE910 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A22266900 | 0_2_0000012A22266900 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222DE9E3 | 0_2_0000012A222DE9E3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222899B0 | 0_2_0000012A222899B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0000012A222869C0 | 0_2_0000012A222869C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DD5E0 | 0_2_00007FF7A44DD5E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A45216C0 | 0_2_00007FF7A45216C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DD2E0 | 0_2_00007FF7A44DD2E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4522DD0 | 0_2_00007FF7A4522DD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F956C | 0_2_00007FF7A44F956C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44EC558 | 0_2_00007FF7A44EC558 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4520540 | 0_2_00007FF7A4520540 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44FD674 | 0_2_00007FF7A44FD674 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A450E777 | 0_2_00007FF7A450E777 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A454678C | 0_2_00007FF7A454678C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DC7E0 | 0_2_00007FF7A44DC7E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4510810 | 0_2_00007FF7A4510810 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4514810 | 0_2_00007FF7A4514810 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A45157F0 | 0_2_00007FF7A45157F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F279C | 0_2_00007FF7A44F279C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44FF87C | 0_2_00007FF7A44FF87C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A45028E8 | 0_2_00007FF7A45028E8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44EC8E8 | 0_2_00007FF7A44EC8E8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A45048DC | 0_2_00007FF7A45048DC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F08B4 | 0_2_00007FF7A44F08B4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4518130 | 0_2_00007FF7A4518130 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4525210 | 0_2_00007FF7A4525210 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F51A0 | 0_2_00007FF7A44F51A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A45292E0 | 0_2_00007FF7A45292E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A452E350 | 0_2_00007FF7A452E350 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A452A3F0 | 0_2_00007FF7A452A3F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44E2470 | 0_2_00007FF7A44E2470 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DB420 | 0_2_00007FF7A44DB420 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44FA514 | 0_2_00007FF7A44FA514 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44E9500 | 0_2_00007FF7A44E9500 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DC4B0 | 0_2_00007FF7A44DC4B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F6D8C | 0_2_00007FF7A44F6D8C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4539D70 | 0_2_00007FF7A4539D70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4515D20 | 0_2_00007FF7A4515D20 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A452CD30 | 0_2_00007FF7A452CD30 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44ECDF0 | 0_2_00007FF7A44ECDF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4500DAC | 0_2_00007FF7A4500DAC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44D4DA0 | 0_2_00007FF7A44D4DA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4513DB0 | 0_2_00007FF7A4513DB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F8EEC | 0_2_00007FF7A44F8EEC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A450DEC8 | 0_2_00007FF7A450DEC8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44EBEA0 | 0_2_00007FF7A44EBEA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4526FF0 | 0_2_00007FF7A4526FF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4539070 | 0_2_00007FF7A4539070 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4539050 | 0_2_00007FF7A4539050 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4520100 | 0_2_00007FF7A4520100 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A451C110 | 0_2_00007FF7A451C110 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44FF10C | 0_2_00007FF7A44FF10C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A45050D4 | 0_2_00007FF7A45050D4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A45450B0 | 0_2_00007FF7A45450B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DC9F0 | 0_2_00007FF7A44DC9F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DB9A0 | 0_2_00007FF7A44DB9A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F19D0 | 0_2_00007FF7A44F19D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4522A70 | 0_2_00007FF7A4522A70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F8A3C | 0_2_00007FF7A44F8A3C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44DAAB0 | 0_2_00007FF7A44DAAB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44EBAD0 | 0_2_00007FF7A44EBAD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44E2B80 | 0_2_00007FF7A44E2B80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44E5B80 | 0_2_00007FF7A44E5B80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4513B70 | 0_2_00007FF7A4513B70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A4516B36 | 0_2_00007FF7A4516B36 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F4BB0 | 0_2_00007FF7A44F4BB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A452BBB0 | 0_2_00007FF7A452BBB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44F2C94 | 0_2_00007FF7A44F2C94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44E1C50 | 0_2_00007FF7A44E1C50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FF7A44EBCB8 | 0_2_00007FF7A44EBCB8 |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696487552u |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696487552f |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696487552x |
Source: file.exe, 00000000.00000002.2400768323.0000012A21F8A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696487552} |
Source: file.exe, 00000000.00000003.2329451640.0000012A21FDA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2400768323.0000012A21FC1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696487552o |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696487552d |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696487552j |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696487552] |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~ |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696487552t |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^ |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696487552s |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552 |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696487552t |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552x |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552} |
Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoEx,FormatMessageA, | 0_2_0000012A2231B330 |
Source: C:\Users\user\Desktop\file.exe | Code function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW, | 0_2_0000012A223080AC |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW, | 0_2_0000012A222FD620 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_0000012A223087AC |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW, | 0_2_0000012A223083F8 |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW, | 0_2_0000012A223084C8 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 0_2_0000012A22308560 |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 0_2_0000012A22308AE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_0000012A222FDB64 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 0_2_0000012A22308904 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_0000012A223089B4 |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF7A450169C |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF7A450176C |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 0_2_00007FF7A4501804 |
Source: C:\Users\user\Desktop\file.exe | Code function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW, | 0_2_00007FF7A4501350 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_00007FF7A44FC468 |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 0_2_00007FF7A4501D84 |
Source: C:\Users\user\Desktop\file.exe | Code function: EnumSystemLocalesW, | 0_2_00007FF7A44FC114 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_00007FF7A4501A50 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 0_2_00007FF7A4501BA8 |
Source: C:\Users\user\Desktop\file.exe | Code function: GetLocaleInfoW, | 0_2_00007FF7A4501C58 |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOCK | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |