Source: | Binary string: System.Xml.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Windows.Forms.pdbMZ@ source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: Stealer.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.pdbSystem.ni.dll source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: C:\Users\Malware\Desktop\Arcane\Str\Stealer\Stealer\obj\Release\Stealer.pdb source: zyEDYRU0jw.exe |
Source: | Binary string: System.Configuration.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Net.Http.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: mscorlib.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Security.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.IO.Compression.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Configuration.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Xml.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Xml.ni.pdbRSDS# source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Windows.Forms.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: mscorlib.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: LOGLOA~1.PDBwinload_prod.pdb source: zyEDYRU0jw.exe, 00000000.00000002.2256448828.0000000005B1A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.ni.pdbRSDSJ< source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: acation Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA93)W source: zyEDYRU0jw.exe, 00000000.00000002.2256448828.0000000005B31000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Net.Http.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Management.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Drawing.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Drawing.pdb < source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: mscorlib.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Management.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Management.pdbMZ@ source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.IO.Compression.pdbH source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Configuration.ni.pdbRSDScUN source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Net.Http.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: zyEDYRU0jw.exe, 00000000.00000002.2250498152.0000000002AB2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.telegram.org |
Source: zyEDYRU0jw.exe, 00000000.00000002.2250498152.0000000002AB2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.telegram.orgd |
Source: zyEDYRU0jw.exe | String found in binary or memory: http://icanhazip.com |
Source: zyEDYRU0jw.exe, 00000000.00000002.2250498152.0000000002A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://icanhazip.com/ |
Source: zyEDYRU0jw.exe, 00000000.00000002.2250498152.0000000002A31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Amcache.hve.19.dr | String found in binary or memory: http://upx.sf.net |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://accounts.google.com/oauth/multilogin |
Source: zyEDYRU0jw.exe, 00000000.00000002.2250498152.0000000002AB2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://api.telegram.org/bot |
Source: zyEDYRU0jw.exe, 00000000.00000002.2250498152.0000000002AB2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7501458999:AAE_ZNbE_D3XZ8TXpCn-L8D8f4rkvZodj0c/sendDocument |
Source: zyEDYRU0jw.exe, 00000000.00000002.2250498152.0000000002AB2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7501458999:AAE_ZNbE_D3XZ8TXpCn-L8D8f4rkvZodj0c/sendDocumentT |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://discord.com%https://tiktok.com3https://www.instagram.com%https://twitch.com7https://store.ep |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://gmail.com |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://ipinfo.io/# |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://mega.nz%https://roblox.com%https://cpanel.net |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://ozon.ru |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://www.aol.com1https://www.coinbase.com)https://freebitco.in%https://funpay.com%https://github. |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: tmpB0CD.tmp.dat.0.dr, tmpB0DF.tmp.dat.0.dr, tmpB0DE.tmp.dat.0.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: zyEDYRU0jw.exe | String found in binary or memory: https://x.com-https://ads.google.com-https://pay.google.com |
Source: unknown | Process created: C:\Users\user\Desktop\zyEDYRU0jw.exe "C:\Users\user\Desktop\zyEDYRU0jw.exe" | |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\chcp.com chcp 65001 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr All | |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklist | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp48A1.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp48A1.tmp.bat | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\chcp.com chcp 65001 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 1352 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak | |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 3228 | |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklist | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp48A1.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp48A1.tmp.bat | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr All | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\chcp.com chcp 65001 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 1352 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\chcp.com | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\chcp.com | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ifmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasmontr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mfc42u.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: authfwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcmonitor.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3cfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3api.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: onex.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappprxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: hnetmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netshell.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netsetupapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netiohlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: httpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: polstore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshwfp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2pnetsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2p.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rpcnsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: whhelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlancfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlanapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wshelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: peerdistsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wcmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mobilenetworking.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ktmw32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprmsg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\chcp.com | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\chcp.com | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\timeout.exe | Section loaded: version.dll | Jump to behavior |
Source: | Binary string: System.Xml.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Windows.Forms.pdbMZ@ source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: Stealer.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.pdbSystem.ni.dll source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: C:\Users\Malware\Desktop\Arcane\Str\Stealer\Stealer\obj\Release\Stealer.pdb source: zyEDYRU0jw.exe |
Source: | Binary string: System.Configuration.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Net.Http.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: mscorlib.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Security.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.IO.Compression.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Configuration.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Xml.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Xml.ni.pdbRSDS# source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Windows.Forms.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: mscorlib.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: LOGLOA~1.PDBwinload_prod.pdb source: zyEDYRU0jw.exe, 00000000.00000002.2256448828.0000000005B1A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Management.ni.pdbRSDSJ< source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: acation Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA93)W source: zyEDYRU0jw.exe, 00000000.00000002.2256448828.0000000005B31000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Net.Http.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Management.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Drawing.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Drawing.pdb < source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: mscorlib.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Management.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Management.pdbMZ@ source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.IO.Compression.pdbH source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Configuration.ni.pdbRSDScUN source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Net.Http.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.ni.pdb source: WERD44F.tmp.dmp.19.dr |
Source: | Binary string: System.Core.ni.pdbRSDS source: WERD44F.tmp.dmp.19.dr |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\taskkill.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -20291418481080494s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -100000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99670s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99234s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99125s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -99016s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -98905s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -98791s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -98686s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -98391s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -98239s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -98121s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -98016s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97906s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97797s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97687s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97578s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97468s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97359s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97250s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97140s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -97031s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -96921s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -596812s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -596703s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe TID: 7344 | Thread sleep time: -596594s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 100000 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99890 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99781 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99670 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99562 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99453 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99343 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99234 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99125 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 99016 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 98905 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 98791 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 98686 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 98391 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 98239 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 98121 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 98016 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97906 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97797 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97687 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97578 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97468 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97359 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97250 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97140 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 97031 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 96921 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 596812 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 596703 | Jump to behavior |
Source: C:\Users\user\Desktop\zyEDYRU0jw.exe | Thread delayed: delay time: 596594 | Jump to behavior |
Source: Amcache.hve.19.dr | Binary or memory string: VMware |
Source: zyEDYRU0jw.exe | Binary or memory string: Hyper-V |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: global block list test formVMware20,11696428655 |
Source: Amcache.hve.19.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: zyEDYRU0jw.exe | Binary or memory string: virtualqemu |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: Amcache.hve.19.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: Amcache.hve.19.dr | Binary or memory string: vmci.sys |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: zyEDYRU0jw.exe | Binary or memory string: IsVirtualMachine |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: Amcache.hve.19.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.19.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.19.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.19.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: Amcache.hve.19.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.19.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.19.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.19.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.19.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.19.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: zyEDYRU0jw.exe | Binary or memory string: <IsVirtualMachine>b__1_0 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: Amcache.hve.19.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: Amcache.hve.19.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.19.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.19.dr | Binary or memory string: VMware, Inc. |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: discord.comVMware20,11696428655f |
Source: Amcache.hve.19.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.19.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.19.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: Amcache.hve.19.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: Amcache.hve.19.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: Amcache.hve.19.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: zyEDYRU0jw.exe, 00000000.00000002.2249779842.0000000000E81000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: Amcache.hve.19.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.19.dr | Binary or memory string: vmci.syshbin` |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: Amcache.hve.19.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: Amcache.hve.19.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: Amcache.hve.19.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: tmpB110.tmp.dat.0.dr | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |