Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://https://https/:://websocketpp.processorGeneric |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: LinxOptimizer.exe, LinxOptimizer.exe, 00000000.00000003.2260338602.000001AE90C16000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2487801807.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844057412.000001AE90C16000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2295402927.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2181742732.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2239890715.000001AE90C11000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2318797859.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2188896280.000001AE90C07000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2482479874.000001AE90C12000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2325384597.000001AE90C0D000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2239321935.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2346398164.000001AE90C0C000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2178458432.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2850327793.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2246837794.000001AE90C11000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2183802708.000001AE90C12000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2190228861.000001AE90C07000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2537836955.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165053637.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/ |
Source: LinxOptimizer.exe, 00000000.00000003.2487801807.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2295402927.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2181742732.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2318797859.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2239321935.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2178458432.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2850327793.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2537836955.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165053637.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2189793312.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2190228861.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2537030298.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2210247415.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2310648987.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2585903348.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2213312002.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2298878312.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2323600596.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2191758008.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2246605059.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000002.4573141265.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/%7 |
Source: LinxOptimizer.exe, 00000000.00000003.2260338602.000001AE90C16000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844057412.000001AE90C16000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2239890715.000001AE90C11000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2188896280.000001AE90C07000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2482479874.000001AE90C12000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2325384597.000001AE90C0D000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2346398164.000001AE90C0C000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2246837794.000001AE90C11000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2183802708.000001AE90C12000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2190228861.000001AE90C07000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2335647976.000001AE90C08000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2317587604.000001AE90C12000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2243812649.000001AE90C11000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2263120363.000001AE90C16000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2175225526.000001AE90C08000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2180684612.000001AE90C07000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2249899897.000001AE90C08000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2299584453.000001AE90C08000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2420033656.000001AE90C08000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2351342630.000001AE90C11000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2292332307.000001AE90C08000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/Ph |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/Russia |
Source: LinxOptimizer.exe, 00000000.00000003.2487801807.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2295402927.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2181742732.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2318797859.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2239321935.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2178458432.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2850327793.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2537836955.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165053637.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2189793312.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2190228861.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2537030298.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2210247415.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2310648987.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2585903348.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2213312002.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2298878312.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2323600596.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2191758008.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2246605059.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000002.4573141265.000001AE90CA2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/~7 |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: LinxOptimizer.exe | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage |
Source: LinxOptimizer.exe | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FAB000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2165175087.000001AE91022000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2844116936.000001AE90FFA000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2349764596.000001AE90FD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C5246D94 | 0_2_00007FF6C5246D94 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C52428BC | 0_2_00007FF6C52428BC |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C525A920 | 0_2_00007FF6C525A920 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C524A110 | 0_2_00007FF6C524A110 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C525F7B4 | 0_2_00007FF6C525F7B4 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C555CF70 | 0_2_00007FF6C555CF70 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C5233F78 | 0_2_00007FF6C5233F78 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C5248028 | 0_2_00007FF6C5248028 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C5264150 | 0_2_00007FF6C5264150 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C5237993 | 0_2_00007FF6C5237993 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C526C1D0 | 0_2_00007FF6C526C1D0 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C52381B7 | 0_2_00007FF6C52381B7 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_00007FF6C526ACE4 | 0_2_00007FF6C526ACE4 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_000001AE90961170 | 0_2_000001AE90961170 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_000001AE9088BA30 | 0_2_000001AE9088BA30 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_000001AE909E1F06 | 0_2_000001AE909E1F06 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_000001AE909E1F16 | 0_2_000001AE909E1F16 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_000001AE909ECAD2 | 0_2_000001AE909ECAD2 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_000001AE909E4EE1 | 0_2_000001AE909E4EE1 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Code function: 0_2_000001AE90A63144 | 0_2_000001AE90A63144 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: xinput1_4.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4576225983.00007FF6C5535000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: SOFTWARE\VMware, Inc.\VMware ToolsNOPQRSTUVWXYZABCDEFGHIJKLMnopqrstuvwxyzabcdefghijklm0123456789+/LoadLibraryA |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696487552u |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdvboxserviceu |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayx64dbgh |
Source: LinxOptimizer.exe, 00000000.00000002.4576225983.00007FF6C5535000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: Kernel32.dllKernel32.dll\\.\VBoxMiniRdrDN |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696487552f |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696487552x |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwareuser |
Source: LinxOptimizer.exe, 00000000.00000002.4576225983.00007FF6C5535000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: \\.\VBoxMiniRdrDN |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696487552} |
Source: LinxOptimizer.exe, 00000000.00000003.2175225526.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2298878312.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2187397564.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2183594561.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2246605059.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2537836955.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2188896280.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000002.4571519588.000001AE907B9000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2585903348.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp, LinxOptimizer.exe, 00000000.00000003.2537030298.000001AE90CC3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696487552o |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwaretray |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-gaVGAuthServicevmwaretrayv |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696487552d |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696487552j |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696487552] |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x |
Source: LinxOptimizer.exe, LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtray |
Source: LinxOptimizer.exe, LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-ga |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h |
Source: LinxOptimizer.exe, 00000000.00000002.4576225983.00007FF6C5535000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~ |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696487552t |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^ |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: wiresharkvmwareuseri |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n |
Source: LinxOptimizer.exe, 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsd |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696487552s |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552 |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696487552t |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552x |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696487552} |
Source: LinxOptimizer.exe, 00000000.00000002.4573764135.000001AE9109B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552 |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtProtectVirtualMemory: Direct from: 0x7FF6C5679D99 | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtProtectVirtualMemory: Direct from: 0x7FF6C5678FCB | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtProtectVirtualMemory: Direct from: 0x7FF6C5665E33 | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtQuerySystemInformation: Direct from: 0x7FF6C568F5CF | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtQuerySystemInformation: Direct from: 0x7FF6C5685F16 | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtQuerySystemInformation: Direct from: 0x7FF6C56A499E | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtProtectVirtualMemory: Direct from: 0x7FF6C56A69B3 | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtQueryInformationProcess: Direct from: 0x7FF6C56ECAAA | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtQueryInformationProcess: Direct from: 0x7FF6C5690EAD | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtQuerySystemInformation: Direct from: 0x7FF6C56E6625 | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | NtProtectVirtualMemory: Direct from: 0x7FF6C56AF839 | Jump to behavior |
Source: LinxOptimizer.exe | String found in binary or memory: Electrum |
Source: LinxOptimizer.exe | String found in binary or memory: \ElectronCash\wallets |
Source: LinxOptimizer.exe | String found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb |
Source: LinxOptimizer.exe | String found in binary or memory: \Exodus\exodus.wallet |
Source: LinxOptimizer.exe | String found in binary or memory: \Ethereum\keystore |
Source: LinxOptimizer.exe | String found in binary or memory: \Exodus\exodus.wallet |
Source: LinxOptimizer.exe | String found in binary or memory: Ethereum |
Source: LinxOptimizer.exe | String found in binary or memory: \Coinomi\Coinomi\wallets |
Source: LinxOptimizer.exe | String found in binary or memory: \Ethereum\keystore |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\LinxOptimizer.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: Yara match | File source: 0.2.LinxOptimizer.exe.1ae909b81d0.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000003.2190228861.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2537836955.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2850327793.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2245914077.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2298878312.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2210247415.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2203490622.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2185206105.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2189793312.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2181742732.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2940481873.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2183594561.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2179475660.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2239321935.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2180684612.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2311728606.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2487801807.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2585903348.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2319469067.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2310648987.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2243812649.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2165053637.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2207225316.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2178458432.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2318797859.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4572287951.000001AE90870000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2309581995.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2537030298.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2175225526.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2246605059.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2187397564.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2213312002.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2295402927.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2191758008.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4573314180.000001AE90D0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2188896280.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2323600596.000001AE90D08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: LinxOptimizer.exe PID: 7040, type: MEMORYSTR |