Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://https://https/:://websocketpp.processorGeneric |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000003.1724100450.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1726953792.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1726802121.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1795873465.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1734763937.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1755127204.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1728854272.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1703230610.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1707260626.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1725973398.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1889207696.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1732642943.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1750873503.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1703230610.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1733058061.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1935694968.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1883272286.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1732642943.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3505941709.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1727890985.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/ |
Source: Nexus-Executor.exe, 00000000.00000003.1724100450.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1726802121.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1795873465.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1889207696.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1703230610.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1935694968.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1732642943.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1707260626.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3505941709.000001FDF9CB6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/& |
Source: Nexus-Executor.exe, 00000000.00000003.1726953792.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1734763937.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1755127204.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1728854272.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1703230610.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1707260626.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1725973398.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1732642943.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1750873503.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1733058061.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1883272286.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3505941709.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1727890985.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724100450.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1736981495.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1750576938.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1795873465.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1935694968.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724886554.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1737976085.000001FDF9C97000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1719576033.000001FDF9C91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/LL_OnlyV |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/Russia |
Source: Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417. |
Source: Nexus-Executor.exe, 00000000.00000003.1708548117.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700896253.000001FDF9F0D000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700716282.000001FDF9F09000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=169633223841 |
Source: Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg |
Source: Nexus-Executor.exe, 00000000.00000003.1708548117.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700896253.000001FDF9F0D000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700716282.000001FDF9F09000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOY |
Source: Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.3508238381.00007FF628611000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage |
Source: Nexus-Executor.exe, 00000000.00000002.3508238381.00007FF628611000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold |
Source: Nexus-Executor.exe, 00000000.00000003.1708548117.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700896253.000001FDF9F0D000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700716282.000001FDF9F09000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm |
Source: Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi |
Source: Nexus-Executor.exe, 00000000.00000003.1708548117.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506389320.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mic |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA079000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1708548117.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1704054287.000001FDFA045000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FB2000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506389320.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9EF9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E77000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9F58000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: Nexus-Executor.exe, 00000000.00000003.1704054287.000001FDFA054000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1805839490.000001FDFA020000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FB2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016My |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA079000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1704054287.000001FDFA045000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9EE1000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9EF9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: Nexus-Executor.exe, 00000000.00000003.1704054287.000001FDFA054000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1805839490.000001FDFA020000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9EE1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17R |
Source: Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9EE1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17er_id)gment_id) |
Source: Nexus-Executor.exe, 00000000.00000003.1700896253.000001FDF9F0D000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700716282.000001FDF9F09000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a781128 |
Source: Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94 |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: Nexus-Executor.exe, 00000000.00000003.1708548117.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700896253.000001FDF9F0D000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1700716282.000001FDF9F09000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9F0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a121 |
Source: Nexus-Executor.exe, 00000000.00000003.1699907900.000001FDF9F11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219 |
Source: Nexus-Executor.exe, 00000000.00000003.1699638557.000001FDFA09E000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729105035.000001FDF9FA9000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1724297610.000001FDF9FCC000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E83000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865EA60 | 0_2_00007FF62865EA60 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628660330 | 0_2_00007FF628660330 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628664320 | 0_2_00007FF628664320 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865F2F0 | 0_2_00007FF62865F2F0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865FCE0 | 0_2_00007FF62865FCE0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628625A30 | 0_2_00007FF628625A30 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62862FA00 | 0_2_00007FF62862FA00 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628652A00 | 0_2_00007FF628652A00 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF6286459E0 | 0_2_00007FF6286459E0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62863B1E0 | 0_2_00007FF62863B1E0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62864F9E0 | 0_2_00007FF62864F9E0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62862E1C0 | 0_2_00007FF62862E1C0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865BA80 | 0_2_00007FF62865BA80 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62863C270 | 0_2_00007FF62863C270 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62862C250 | 0_2_00007FF62862C250 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62862F250 | 0_2_00007FF62862F250 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865C310 | 0_2_00007FF62865C310 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62861FBB0 | 0_2_00007FF62861FBB0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628617390 | 0_2_00007FF628617390 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865A370 | 0_2_00007FF62865A370 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62863DB50 | 0_2_00007FF62863DB50 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865CB40 | 0_2_00007FF62865CB40 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628646BC0 | 0_2_00007FF628646BC0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628616CB0 | 0_2_00007FF628616CB0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628636C90 | 0_2_00007FF628636C90 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62864D530 | 0_2_00007FF62864D530 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62863BD10 | 0_2_00007FF62863BD10 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628660D02 | 0_2_00007FF628660D02 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF6286354F0 | 0_2_00007FF6286354F0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628647CE0 | 0_2_00007FF628647CE0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62865E5B0 | 0_2_00007FF62865E5B0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628615D90 | 0_2_00007FF628615D90 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62863AD40 | 0_2_00007FF62863AD40 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62862D620 | 0_2_00007FF62862D620 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628624620 | 0_2_00007FF628624620 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628619E10 | 0_2_00007FF628619E10 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF6286425F0 | 0_2_00007FF6286425F0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628650DE0 | 0_2_00007FF628650DE0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62864CDD0 | 0_2_00007FF62864CDD0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF6286396B0 | 0_2_00007FF6286396B0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628619730 | 0_2_00007FF628619730 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628637EF0 | 0_2_00007FF628637EF0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF6286246F0 | 0_2_00007FF6286246F0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628626EC0 | 0_2_00007FF628626EC0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62861DFB0 | 0_2_00007FF62861DFB0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF6286497F0 | 0_2_00007FF6286497F0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF62863BFC0 | 0_2_00007FF62863BFC0 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_00007FF628656090 | 0_2_00007FF628656090 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_000001FDF9833841 | 0_2_000001FDF9833841 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_000001FDF97FBA30 | 0_2_000001FDF97FBA30 |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Code function: 0_2_000001FDF98D2720 | 0_2_000001FDF98D2720 |
Source: Nexus-Executor.exe, 00000000.00000003.1831599938.000001FDF9788000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1755229819.000001FDF9788000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1750986817.000001FDF9788000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1729060042.000001FDF978D000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.3505375145.000001FDF9792000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1828855367.000001FDF978D000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1759216638.000001FDF9788000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1704421996.000001FDF9783000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1708263889.000001FDF9784000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1879904212.000001FDF978D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE content_annotations(visit_id INTEGER PRIMARY KEY,visibility_score NUMERIC,floc_protected_score NUMERIC,categories VARCHAR,page_topics_model_version INTEGER,annotation_flags INTEGER NOT NULL,entities VARCHAR,related_searches VARCHAR,search_normalized_url VARCHAR,search_terms LONGVARCHAR,alternative_title VARCHAR,page_language VARCHAR,password_state INTEGER DEFAULT 0 NOT NULL,has_url_keyed_image BOOLEAN NOT NULL); |
Source: Nexus-Executor.exe, 00000000.00000003.1883272286.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1887845002.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1725973398.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1935694968.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1733435821.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1718979377.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1750873503.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1889207696.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1737976085.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1732642943.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE autofill_profiles ( guid VARCHAR PRIMARY KEY, company_name VARCHAR, street_address VARCHAR, dependent_locality VARCHAR, city VARCHAR, state VARCHAR, zipcode VARCHAR, sorting_code VARCHAR, country_code VARCHAR, date_modified INTEGER NOT NULL DEFAULT 0, origin VARCHAR DEFAULT '', language_code VARCHAR, use_count INTEGER NOT NULL DEFAULT 0, use_date INTEGER NOT NULL DEFAULT 0, validity_bitfield UNSIGNED NOT NULL DEFAULT 0, is_client_validity_states_updated BOOL NOT NULL DEFAULT FALSE, label VARCHAR, disallow_settings_visible_updates INTEGER NOT NULL DEFAULT 0); |
Source: Nexus-Executor.exe, 00000000.00000002.3506018558.000001FDF9E73000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: xinput1_4.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Nexus-Executor.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtray |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdvboxserviceu |
Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-ga |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayx64dbgh |
Source: Nexus-Executor.exe, 00000000.00000003.1883272286.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1887845002.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1725973398.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1935694968.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1733435821.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1718979377.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1750873503.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1889207696.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1737976085.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1732642943.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW. |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwareuser |
Source: Nexus-Executor.exe, 00000000.00000003.1883272286.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1887845002.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1725973398.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1935694968.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1733435821.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1718979377.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1750873503.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1889207696.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1737976085.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.1732642943.000001FDF9CDB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: wiresharkvmwareuseri |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsd |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwaretray |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: uuuYqeMuuqMuup_vuuuuuuuuuuuuuuuuuuuvuuuuuuuueuuuuuuWwSuu~L |
Source: Nexus-Executor.exe, 00000000.00000002.3505466703.000001FDF97E0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-gaVGAuthServicevmwaretrayv |