Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Section loaded: cryptnet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696494690f |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696494690s |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696494690n |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696494690d |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696494690u |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696494690t |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696494690} |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696494690x |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690^ |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z |
Source: Cracker.exe, 00000000.00000002.1979276829.00000297930A2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllPP9 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696494690h |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696494690o |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696494690~ |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696494690j |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696494690t |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696494690x |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690} |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696494690] |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690x |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690 |
Source: Cracker.exe, 00000000.00000003.1892790947.000002979310D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696494690|UE |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Roaming VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\Cracker.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\desktop.ini VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\EFOYFBOLXA.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\EFOYFBOLXA.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\GAOBCVIQIJ.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\IPKGELNTQY.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\LSBIHQFDVT.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\LSBIHQFDVT.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\LSBIHQFDVT.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\LSBIHQFDVT.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\NEBFQQYWPS.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\NEBFQQYWPS.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\NEBFQQYWPS.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\NEBFQQYWPS.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\PALRGUCVEH.mp3 VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\PIVFAGEAAV.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\PIVFAGEAAV.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\PWCCAWLGRE.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\PWCCAWLGRE.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\QNCYCDFIJJ.mp3 VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\QNCYCDFIJJ.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\QNCYCDFIJJ.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\QNCYCDFIJJ.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\SQSJKEBWDT.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\SQSJKEBWDT.mp3 VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\SUAVTZKNFL.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\SUAVTZKNFL.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\ZQIXMVQGAH.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\ZQIXMVQGAH.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\ZQIXMVQGAH.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Desktop\ZQIXMVQGAH.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\desktop.ini VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\EFOYFBOLXA.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\EFOYFBOLXA.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\GAOBCVIQIJ.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\GAOBCVIQIJ.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\IPKGELNTQY.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\IPKGELNTQY.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\LSBIHQFDVT.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\LSBIHQFDVT.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\LSBIHQFDVT.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\LSBIHQFDVT.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\NEBFQQYWPS.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\NEBFQQYWPS.docx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\NEBFQQYWPS.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\NEBFQQYWPS.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\PALRGUCVEH.mp3 VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\PIVFAGEAAV.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\PIVFAGEAAV.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\PWCCAWLGRE.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\PWCCAWLGRE.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\QNCYCDFIJJ.mp3 VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\QNCYCDFIJJ.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\QNCYCDFIJJ.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\QNCYCDFIJJ.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\QNCYCDFIJJ.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\SQSJKEBWDT.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\SQSJKEBWDT.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\SQSJKEBWDT.mp3 VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\SUAVTZKNFL.pdf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\ZQIXMVQGAH.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\ZQIXMVQGAH.jpg VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\ZQIXMVQGAH.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\Documents\ZQIXMVQGAH.xlsx VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Autofill VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Cookies VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Downloads VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\History VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\screen1.png VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\sensitive-files.zip VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\user_info.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\user_info.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Wallets VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Passwords\Chrome_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Passwords\Chrome_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Passwords\Edge_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Passwords\Edge_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Passwords\Firefox_qnq0haq7.default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Passwords\Firefox_qnq0haq7.default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\History\Chrome_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\History\Chrome_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\History\Edge_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\History\Edge_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\History\Firefox_qnq0haq7.default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Downloads\Chrome_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Downloads\Edge_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Downloads\Edge_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Downloads\Firefox_qnq0haq7.default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Cookies\Chrome_Default_Network.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Cookies\Edge_Default_Network.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Cookies\Edge_Default_Network.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Cookies\Firefox_qnq0haq7.default_Network.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Autofill\Chrome_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Autofill\Edge_Default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\PeAx1cGearPUOxYmqJLOshcWh0wbHd\Autofill\Firefox_qnq0haq7.default.txt VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\out.zip VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhl | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite-shm | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\aghbiahbpaijignceidepookljebhfak\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App Settings\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\igkpcodhieompeloncfnbekccinhapdb | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\naepdomgkenhinolocfifgehidddafch | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDB\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite-wal | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbml | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflal | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\6f463e7a-ef1f-4e71-ae85-88471a72b3d6\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oboonakemofpalcgghocfoadofidjkkk | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kmhcihpebfmpgmihbkipmjlmmioameka | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfogiafebfohielmmehodmfbbebbbpei | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfel | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bmikpgodpkclnkgmnpphehdgcimmided | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\caljgklbbfbcjjanaijlacgncafpegll | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\b7e6c706-6d19-4b9e-9c37-e5ee870c2129\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\84b89d2b-fec7-4b59-87f2-603dcfbd43dd\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\881ae04a-fa90-4a62-8eee-5ae000467040\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\b79425d0-2f84-41d2-84d3-9f598259534d\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fdjamakpfbbddfjaooikfcpapjohcfmg | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\af2cf244-1bda-453b-baae-9793e72e9be8\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\697416b8-55c0-41ac-9636-a06aa38f99e9\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\1dcaa933-a69d-41cc-acb5-708980d119e5\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e9edf720-d88f-46ea-8d95-7134a339b3c1\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kz8kl7vh.default\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\admmjipmmciaobhojoghlmleefbicajg | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jhfjfclepacoldmjmkmdlmganfaalklb | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\icmkfkmjoklfhlfdkkkgpnpldkgdmhoe | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDB\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\chgfefjpcobfbnpmiokfjjaglahmnded | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fooolghllnmhmmndgjiamiiodkpenpbb | Jump to behavior |
Source: C:\Users\user\Desktop\Cracker.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pnlccmojcmeohlpggmfnbbiapkmbliob | Jump to behavior |