Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4472768495.0000018CD2150000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4470519625.0000018CCBC0F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/ |
Source: Fortexternal.exe, 00000000.00000002.4470519625.0000018CCBC0F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/a |
Source: Fortexternal.exe, 00000000.00000002.4471755752.0000018CD0654000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/x~ |
Source: Fortexternal.exe, 00000000.00000003.2105850326.0000018CD25B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: Fortexternal.exe, 00000000.00000003.2105850326.0000018CD25B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: Fortexternal.exe, 00000000.00000003.2105850326.0000018CD25B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: Fortexternal.exe, 00000000.00000003.2105850326.0000018CD25B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold |
Source: Fortexternal.exe, 00000000.00000003.2105850326.0000018CD25B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: Fortexternal.exe, 00000000.00000003.2105850326.0000018CD25B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: Fortexternal.exe, 00000000.00000003.2105850326.0000018CD25B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: Fortexternal.exe, 00000000.00000003.3034655629.0000018CD242A000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD258B000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2098405327.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4475737301.0000018CD2568000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2096279929.0000018CD24C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D21EF0 | 0_2_00007FF7B9D21EF0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D2C0A0 | 0_2_00007FF7B9D2C0A0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D22F30 | 0_2_00007FF7B9D22F30 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D4030C | 0_2_00007FF7B9D4030C |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D21660 | 0_2_00007FF7B9D21660 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D228E0 | 0_2_00007FF7B9D228E0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CFAAF0 | 0_2_00007FF7B9CFAAF0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CE9AC0 | 0_2_00007FF7B9CE9AC0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D27A80 | 0_2_00007FF7B9D27A80 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CDCA10 | 0_2_00007FF7B9CDCA10 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D139E0 | 0_2_00007FF7B9D139E0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D0F9D0 | 0_2_00007FF7B9D0F9D0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CD8990 | 0_2_00007FF7B9CD8990 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CFD940 | 0_2_00007FF7B9CFD940 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D18C90 | 0_2_00007FF7B9D18C90 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CE0BB0 | 0_2_00007FF7B9CE0BB0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CFEBC0 | 0_2_00007FF7B9CFEBC0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D1EF10 | 0_2_00007FF7B9D1EF10 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CFEE70 | 0_2_00007FF7B9CFEE70 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CF1E50 | 0_2_00007FF7B9CF1E50 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CEEE50 | 0_2_00007FF7B9CEEE50 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CFDDE0 | 0_2_00007FF7B9CFDDE0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CF0DC0 | 0_2_00007FF7B9CF0DC0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CF80F0 | 0_2_00007FF7B9CF80F0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CD9F90 | 0_2_00007FF7B9CD9F90 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D1CF70 | 0_2_00007FF7B9D1CF70 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CE72F0 | 0_2_00007FF7B9CE72F0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CFC2B0 | 0_2_00007FF7B9CFC2B0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D26290 | 0_2_00007FF7B9D26290 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CE7220 | 0_2_00007FF7B9CE7220 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CF0220 | 0_2_00007FF7B9CF0220 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D051F0 | 0_2_00007FF7B9D051F0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D211B0 | 0_2_00007FF7B9D211B0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D10130 | 0_2_00007FF7B9D10130 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D0C3F0 | 0_2_00007FF7B9D0C3F0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CDC330 | 0_2_00007FF7B9CDC330 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D1E680 | 0_2_00007FF7B9D1E680 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CE8630 | 0_2_00007FF7B9CE8630 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D15600 | 0_2_00007FF7B9D15600 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D125E0 | 0_2_00007FF7B9D125E0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D085E0 | 0_2_00007FF7B9D085E0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CF2600 | 0_2_00007FF7B9CF2600 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D23902 | 0_2_00007FF7B9D23902 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D6F900 | 0_2_00007FF7B9D6F900 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CFE910 | 0_2_00007FF7B9CFE910 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D0A8E0 | 0_2_00007FF7B9D0A8E0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CD98B0 | 0_2_00007FF7B9CD98B0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CF9890 | 0_2_00007FF7B9CF9890 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9CE27B0 | 0_2_00007FF7B9CE27B0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D097C0 | 0_2_00007FF7B9D097C0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D1F740 | 0_2_00007FF7B9D1F740 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_00007FF7B9D00750 | 0_2_00007FF7B9D00750 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_0000018CD0A3B080 | 0_2_0000018CD0A3B080 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Code function: 0_2_0000018CD0A769C0 | 0_2_0000018CD0A769C0 |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: drprov.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: ntlanman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: davclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: davhlpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: quartz.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: mmdevapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: ksuser.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: audioses.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: midimap.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: xinput1_4.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Fortexternal.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\Vmmouse.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VBoxMouse |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HYPER_X: added Hyper-V artifact VM |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmci |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VM_FILES: vmware score: |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: hyper-v |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SOFTWARE\Microsoft\VirtualMachine |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Hyper-V artifact (not an actual VM) |
Source: Fortexternal.exe, 00000000.00000002.4472768495.0000018CD2150000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWh |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VBoxTrayToolWndClass |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmdebug |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\msvmmouf |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware SVGA* |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\xenevtchn |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: c:\windows\system32\drivers\vpc-s3.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SOFTWARE\VMware, Inc.\VMware Tools |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\VMToolsHook.dll |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMUSrvc.exe |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\VBoxMouse.sys |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: ManufacturerSELECT * FROM Win32_BaseBoard. Error: Failed to open event log: Failed to query event log: EvtNext failed. Error: EvtRender failed. Error: VMID: qemukvmvirtualvboxvirtualboxmonitorhypervhypervisorhvisorparallelsvmwarematch = BRAND_KEYWORDS: matches: |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\VMMEMCTL |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\HARDWARE\ACPI\FADT\VBOX__ |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vmware |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\HARDWARE\ACPI\DSDT\VBOX__ |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: c:\windows\system32\drivers\prlmouse.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\xennet6 |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\HARDWARE\ACPI\RSDT\VBOX__ |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vpc-s3 |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: QEMU+KVM Hyper-V Enlightenment |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\CurrentControlSet\Enum\IDE\CdRomNECVMWar_VMware_IDE_CD* |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: c:\windows\system32\drivers\prleth.sys |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\vboxmrxnp.dll |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\xensvc |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\vmhgfs.dll |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VBoxSF |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmware |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SOFTWARE\Microsoft\Hyper-V |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\vboxservice.exe |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdvboxservicer |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\CurrentControlSet\Enum\IDE\DiskVMware_Virtual_IDE_Hard_Drive* |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmx86 |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwareuser |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\xenvdb |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\VBoxSF |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: KVM Hyper-V Enlightenment |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\VBoxService |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtray |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\VBoxSF.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmicheartbeat |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Microsoft Virtual PC/Hyper-V |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Xbox NanoVisor (Hyper-V) |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsd |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: c:\windows\system32\drivers\vmsrvc.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\xennet |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VBoxGuest |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: c:\windows\system32\drivers\prl_pv32.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware* |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: QEMU Virtual CPU |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HYPER_X: added Hyper-V real VM |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: QEMU+KVM |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vmusrvc.exe |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: QEMU_HDD: model = |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayx64dbge |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\CurrentControlSet\Enum\IDE\CdRomNECVMWar_VMware_SATA_CD* |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: qemu-ga.exe |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware- |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: \\.\VBoxMiniRdrDN |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmicexchange |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmicshutdown |
Source: Fortexternal.exe, 00000000.00000003.2087549124.0000018CD21C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2073909900.0000018CD21C0000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2090329014.0000018CD21C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2091902136.0000018CD21C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2092187920.0000018CD21C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4472934292.0000018CD21C3000.00000004.00000020.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000003.2093754124.0000018CD21C3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\vboxtray.exe |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VBoxTrayToolWnd |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMWARE |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Microsoft Hyper-V |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\VBoxMouse |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKCU\SOFTWARE\VMware, Inc.\VMware Tools |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Microsoft Azure Hyper-V |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: NETTITUDE_VM_MEMORY: Hyper-V detected |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: qemu-ga |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMWARE_REG: result = |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\vmGuestLib.dll |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware ESX |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\VMTools |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMwareVMware |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vmsrvc.exe |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vboxservice.exe |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware Workstation |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vpcbus |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vboxtray.exe |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: c:\windows\system32\drivers\prlvideo.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\VBoxGuest.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmmouse |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\CurrentControlSet\Enum\IDE\DiskVMware_Virtual_SATA_Hard_Drive* |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vmicvss |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vmware tools |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware GSX |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware Fusion |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMware Express |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwaretray |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: Fortexternal.exe, 00000000.00000003.2097449555.0000018CD252A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-gaVGAuthServicevmwaretrays |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\vpcuhub |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: c:\windows\system32\drivers\prlfs.sys |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMSrvc.exe |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\vboxhook.dll |
Source: Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: HKLM\SYSTEM\ControlSet001\Services\VBoxGuest |
Source: Fortexternal.exe, 00000000.00000002.4472641830.0000018CD09D0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: wiresharkvmwareuserf |
Source: Fortexternal.exe, Fortexternal.exe, 00000000.00000002.4476689952.00007FF7B9CD1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: C:\windows\System32\Drivers\VmGuestLibJava.dll |