Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then cmp dword ptr [edx+ecx*8], 877F203Ah |
2_2_00442140 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then jmp eax |
2_2_0040C916 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then movzx ebx, byte ptr [edi] |
2_2_0040DD2B |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov word ptr [eax], cx |
2_2_004251E0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov word ptr [eax], cx |
2_2_004251E0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov ecx, eax |
2_2_00409D80 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then cmp dword ptr [ebx+edx*8], 3174E150h |
2_2_00440E40 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then movzx esi, byte ptr [esp+ecx+000001A4h] |
2_2_0040A210 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then movzx ebx, ax |
2_2_00439B70 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov byte ptr [edi], cl |
2_2_0040CF82 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then cmp dword ptr [edi+edx*8], 4C697C35h |
2_2_00441460 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then cmp dword ptr [edi+edx*8], F6E92F34h |
2_2_00440C90 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov eax, dword ptr [esi+4Ch] |
2_2_0040D4B9 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then movzx esi, byte ptr [esp+edi+09h] |
2_2_00409940 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then movzx esi, byte ptr [esp+edi+08h] |
2_2_00409940 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov byte ptr [edx], bl |
2_2_00409940 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then cmp byte ptr [edx+ecx+01h], 00000000h |
2_2_0042BD40 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then jmp eax |
2_2_0040CD42 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov ebx, edi |
2_2_0043A5D0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then jmp eax |
2_2_0040C991 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov edi, ecx |
2_2_0040E59B |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then cmp dword ptr [ecx+ebx*8], 9C142CDAh |
2_2_004411B0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then jmp eax |
2_2_0040CA52 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then inc eax |
2_2_004202F0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then cmp dword ptr [edx+ecx*8], 484CE391h |
2_2_00441A90 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov esi, eax |
2_2_00440300 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then movzx edx, byte ptr [esi+edi] |
2_2_00401F10 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then lea eax, dword ptr [ebp+04h] |
2_2_0043A720 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then jmp ecx |
2_2_0043FF20 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 4x nop then mov esi, eax |
2_2_0043FF20 |
Source: Network traffic |
Suricata IDS: 2057658 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (librari-night .sbs) : 192.168.2.4:61931 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49734 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2057646 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (revirepart .biz) : 192.168.2.4:65437 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49735 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2057668 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (processhol .sbs) : 192.168.2.4:58217 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49737 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2057647 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (revirepart .biz in TLS SNI) : 192.168.2.4:49733 -> 104.21.43.198:443 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49738 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2057697 - Severity 1 - ET MALWARE Observed DNS Query to Lumma Stealer Domain (processhol .sbs) : 192.168.2.4:58217 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49740 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49744 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49746 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2057659 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (librari-night .sbs in TLS SNI) : 192.168.2.4:49736 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49733 -> 104.21.43.198:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49733 -> 104.21.43.198:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49734 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49734 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49735 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49735 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49740 -> 172.67.206.172:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49746 -> 172.67.206.172:443 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: injector V2.5.exe |
String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: injector V2.5.exe, 00000002.00000002.1929912011.00000000033B4000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902650994.00000000033B4000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1720545360.00000000033B4000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1923653498.00000000033B4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: injector V2.5.exe |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y |
Source: injector V2.5.exe |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: injector V2.5.exe |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: injector V2.5.exe |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: injector V2.5.exe |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0# |
Source: injector V2.5.exe |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: injector V2.5.exe |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: injector V2.5.exe |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: injector V2.5.exe |
String found in binary or memory: http://ocsp.comodoca.com0 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: injector V2.5.exe |
String found in binary or memory: http://ocsp.sectigo.com0 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.c.lencr.org/0 |
Source: injector V2.5.exe, 00000002.00000003.1821148663.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.i.lencr.org/0 |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: injector V2.5.exe, 00000002.00000002.1930206544.00000000033FC000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1924998682.00000000033D8000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1924998682.00000000033E9000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1799048884.0000000005AE6000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1925547199.00000000033FC000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902129361.00000000033FB000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1872564200.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1799214621.00000000033D3000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1930155911.00000000033DC000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902620677.00000000033D7000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1799241711.0000000005AEC000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1799418781.0000000005AED000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1926539223.00000000033DB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs/ |
Source: injector V2.5.exe, 00000002.00000003.1799214621.00000000033D3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs/OT |
Source: injector V2.5.exe, 00000002.00000003.1923653498.0000000003361000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1873674145.00000000033FB000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902129361.00000000033FB000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902650994.00000000033B4000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1929912011.0000000003361000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902597448.00000000033E6000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1799214621.00000000033D3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs/api |
Source: injector V2.5.exe, 00000002.00000003.1923653498.000000000337E000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1929912011.000000000337E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs/apir |
Source: injector V2.5.exe, 00000002.00000003.1902012825.00000000033E5000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs/api~ |
Source: injector V2.5.exe, 00000002.00000003.1798953231.0000000005AE6000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776244127.00000000033EC000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs/r |
Source: injector V2.5.exe, 00000002.00000003.1902620677.00000000033D7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs/t? |
Source: injector V2.5.exe, 00000002.00000003.1923653498.000000000337E000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902597448.00000000033E6000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1902012825.00000000033E5000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1929912011.000000000337E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://librari-night.sbs:443/api |
Source: injector V2.5.exe |
String found in binary or memory: https://sectigo.com/CPS0 |
Source: injector V2.5.exe, 00000002.00000003.1776917061.0000000005B85000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.microsof |
Source: injector V2.5.exe, 00000002.00000003.1822505611.0000000005C01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: injector V2.5.exe, 00000002.00000003.1822505611.0000000005C01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: injector V2.5.exe, 00000002.00000003.1799004611.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1799257320.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1798838778.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776917061.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1777081480.0000000005B37000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: injector V2.5.exe, 00000002.00000003.1777081480.0000000005B12000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: injector V2.5.exe, 00000002.00000003.1799004611.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1799257320.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1798838778.0000000005B37000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776917061.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1777081480.0000000005B37000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: injector V2.5.exe, 00000002.00000003.1777081480.0000000005B12000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: injector V2.5.exe, 00000002.00000003.1776561248.0000000005B29000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1776480308.0000000005B2B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: injector V2.5.exe, 00000002.00000003.1822505611.0000000005C01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: injector V2.5.exe, 00000002.00000003.1822505611.0000000005C01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: injector V2.5.exe, 00000002.00000003.1822505611.0000000005C01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: injector V2.5.exe, 00000002.00000003.1822505611.0000000005C01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: injector V2.5.exe, 00000002.00000003.1822505611.0000000005C01000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B3D4A0 |
0_2_00B3D4A0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B44CD0 |
0_2_00B44CD0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B46CD0 |
0_2_00B46CD0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B34CC0 |
0_2_00B34CC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B46800 |
0_2_00B46800 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B33440 |
0_2_00B33440 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B47840 |
0_2_00B47840 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B355F0 |
0_2_00B355F0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B25930 |
0_2_00B25930 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B41D30 |
0_2_00B41D30 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B38129 |
0_2_00B38129 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B34910 |
0_2_00B34910 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B3DD00 |
0_2_00B3DD00 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B44170 |
0_2_00B44170 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2B964 |
0_2_00B2B964 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B32AE7 |
0_2_00B32AE7 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B55E22 |
0_2_00B55E22 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B39B80 |
0_2_00B39B80 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B33F80 |
0_2_00B33F80 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B36330 |
0_2_00B36330 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B47330 |
0_2_00B47330 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B35F60 |
0_2_00B35F60 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B41367 |
0_2_00B41367 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2A36B |
0_2_00B2A36B |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B37F54 |
0_2_00B37F54 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B3F340 |
0_2_00B3F340 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0040A467 |
2_2_0040A467 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_004280D0 |
2_2_004280D0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0043C490 |
2_2_0043C490 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00442140 |
2_2_00442140 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0040DD2B |
2_2_0040DD2B |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_004251E0 |
2_2_004251E0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00409D80 |
2_2_00409D80 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00421230 |
2_2_00421230 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00439B70 |
2_2_00439B70 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0040DB17 |
2_2_0040DB17 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00408FA0 |
2_2_00408FA0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_004233B0 |
2_2_004233B0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00405036 |
2_2_00405036 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0040B080 |
2_2_0040B080 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00420090 |
2_2_00420090 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_004064B0 |
2_2_004064B0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0040D4B9 |
2_2_0040D4B9 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00409940 |
2_2_00409940 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00425D40 |
2_2_00425D40 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0040B550 |
2_2_0040B550 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0043C910 |
2_2_0043C910 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00428530 |
2_2_00428530 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_004091D0 |
2_2_004091D0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00403980 |
2_2_00403980 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00439190 |
2_2_00439190 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00407AE0 |
2_2_00407AE0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_004052E9 |
2_2_004052E9 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_004202F0 |
2_2_004202F0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00441A90 |
2_2_00441A90 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00406B40 |
2_2_00406B40 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0041F740 |
2_2_0041F740 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00440300 |
2_2_00440300 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0043A720 |
2_2_0043A720 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_0043FF20 |
2_2_0043FF20 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00438F30 |
2_2_00438F30 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00406FD0 |
2_2_00406FD0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00405FF0 |
2_2_00405FF0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00402F80 |
2_2_00402F80 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B3C0A0 |
2_2_00B3C0A0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B21000 |
2_2_00B21000 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B46800 |
2_2_00B46800 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B47840 |
2_2_00B47840 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B30190 |
2_2_00B30190 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2A180 |
2_2_00B2A180 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B25930 |
2_2_00B25930 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B34910 |
2_2_00B34910 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B44170 |
2_2_00B44170 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B32AA0 |
2_2_00B32AA0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B39B80 |
2_2_00B39B80 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B37BD0 |
2_2_00B37BD0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B36330 |
2_2_00B36330 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B47330 |
2_2_00B47330 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B3F340 |
2_2_00B3F340 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B3D4A0 |
2_2_00B3D4A0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B44CD0 |
2_2_00B44CD0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B46CD0 |
2_2_00B46CD0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B33440 |
2_2_00B33440 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B355F0 |
2_2_00B355F0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B25540 |
2_2_00B25540 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B55E22 |
2_2_00B55E22 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B3DE70 |
2_2_00B3DE70 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B23E60 |
2_2_00B23E60 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B33F80 |
2_2_00B33F80 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B35F60 |
2_2_00B35F60 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B5D18D mov edi, dword ptr fs:[00000030h] |
0_2_00B5D18D |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2D475 mov edi, dword ptr fs:[00000030h] |
0_2_00B2D475 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2D07E mov edi, dword ptr fs:[00000030h] |
0_2_00B2D07E |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B32C40 mov eax, dword ptr fs:[00000030h] |
0_2_00B32C40 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B32C40 mov eax, dword ptr fs:[00000030h] |
0_2_00B32C40 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2CD0A mov edi, dword ptr fs:[00000030h] |
0_2_00B2CD0A |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2E93A mov edi, dword ptr fs:[00000030h] |
0_2_00B2E93A |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2CD0A mov edi, dword ptr fs:[00000030h] |
0_2_00B2CD0A |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2D6B8 mov edi, dword ptr fs:[00000030h] |
0_2_00B2D6B8 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2D6B8 mov edi, dword ptr fs:[00000030h] |
0_2_00B2D6B8 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2DA6C mov edi, dword ptr fs:[00000030h] |
0_2_00B2DA6C |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B32B9B mov eax, dword ptr fs:[00000030h] |
0_2_00B32B9B |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B32B9B mov eax, dword ptr fs:[00000030h] |
0_2_00B32B9B |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 0_2_00B2E350 mov edi, dword ptr fs:[00000030h] |
0_2_00B2E350 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B32AA0 mov eax, dword ptr fs:[00000030h] |
2_2_00B32AA0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B32AA0 mov eax, dword ptr fs:[00000030h] |
2_2_00B32AA0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B32AA0 mov eax, dword ptr fs:[00000030h] |
2_2_00B32AA0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B32AA0 mov eax, dword ptr fs:[00000030h] |
2_2_00B32AA0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B32AA0 mov eax, dword ptr fs:[00000030h] |
2_2_00B32AA0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
Code function: 2_2_00B2CCC0 mov edi, dword ptr fs:[00000030h] |
2_2_00B2CCC0 |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\injector V2.5.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj |
Jump to behavior |