Source: |
Binary string: ntkrnlmp.pdbo source: file.exe, 00000000.00000002.1804928662.000000000A7AC000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbkD source: file.exe, 00000000.00000002.1886039128.000000000D557000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbr source: file.exe, 00000000.00000002.1840251068.000000000BE1A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb source: file.exe, 00000000.00000002.1840251068.000000000BE11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1827638294.000000000B625000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1791505154.0000000009C0A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1804928662.000000000A7B1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1920109162.000000000E4CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1900265086.000000000DD41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1935143545.000000000EC7E000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbt source: file.exe, 00000000.00000002.1935143545.000000000EC81000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb source: file.exe, 00000000.00000002.1886039128.000000000D552000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbz source: file.exe, 00000000.00000002.1900265086.000000000DD3C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbt source: file.exe, 00000000.00000002.1796538723.000000000A1A8000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbA source: file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbu source: file.exe, 00000000.00000002.1935143545.000000000EC81000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb~Z source: file.exe, 00000000.00000002.1828149453.000000000B64F000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbp source: file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbL source: file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbm source: file.exe, 00000000.00000002.1804928662.000000000A7AC000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbcT(/+ source: file.exe, 00000000.00000002.1886039128.000000000D552000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbx, source: file.exe, 00000000.00000002.1796538723.000000000A1A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1840251068.000000000BE11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1827638294.000000000B625000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1791505154.0000000009C0A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1804928662.000000000A7B1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1920109162.000000000E4CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1792549362.0000000009D8A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1886039128.000000000D552000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1900265086.000000000DD41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1935143545.000000000EC7E000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb}P source: file.exe, 00000000.00000002.1828149453.000000000B64F000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb[ source: file.exe, 00000000.00000002.1792549362.0000000009D8A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\* source: file.exe, 00000000.00000002.1789802750.000000000140E000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbZ source: file.exe, 00000000.00000002.1920109162.000000000E494000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb[ source: file.exe, 00000000.00000002.1920109162.000000000E494000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb~t&+) source: file.exe, 00000000.00000002.1900265086.000000000DD41000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb] source: file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbX source: file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbI source: file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbJ source: file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbM source: file.exe, 00000000.00000002.1840251068.000000000BE11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF4EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW, |
0_2_00BF4EB2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF1DC9 FindFirstFileW,FindNextFileW, |
0_2_00BF1DC9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF1000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection, |
0_2_00BF1000 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF3F87 FindFirstFileW,FindNextFileW, |
0_2_00BF3F87 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF4145 FindFirstFileW,FindNextFileW, |
0_2_00BF4145 |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: file.exe, 00000000.00000002.1872415526.000000000CEEE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: file.exe, 00000000.00000002.1794705574.0000000009FF2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1829020053.000000000B74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: file.exe, 00000000.00000002.1794705574.0000000009FF2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1829020053.000000000B74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1872415526.000000000CEEE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: file.exe, 00000000.00000002.1794705574.0000000009FF2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1829020053.000000000B74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1872415526.000000000CEEE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: file.exe, 00000000.00000002.1794705574.0000000009FF2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1829020053.000000000B74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1872415526.000000000CEEE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: file.exe, 00000000.00000002.1794705574.0000000009FF2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1829020053.000000000B74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1872415526.000000000CEEE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: file.exe, 00000000.00000002.1872415526.000000000CEEE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: file.exe, 00000000.00000002.1794705574.0000000009FF2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1829020053.000000000B74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1855013914.000000000C6D8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: |
Binary string: ntkrnlmp.pdbo source: file.exe, 00000000.00000002.1804928662.000000000A7AC000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbkD source: file.exe, 00000000.00000002.1886039128.000000000D557000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbr source: file.exe, 00000000.00000002.1840251068.000000000BE1A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb source: file.exe, 00000000.00000002.1840251068.000000000BE11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1827638294.000000000B625000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1791505154.0000000009C0A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1804928662.000000000A7B1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1920109162.000000000E4CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1900265086.000000000DD41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1935143545.000000000EC7E000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbt source: file.exe, 00000000.00000002.1935143545.000000000EC81000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb source: file.exe, 00000000.00000002.1886039128.000000000D552000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbz source: file.exe, 00000000.00000002.1900265086.000000000DD3C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbt source: file.exe, 00000000.00000002.1796538723.000000000A1A8000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbA source: file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbu source: file.exe, 00000000.00000002.1935143545.000000000EC81000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb~Z source: file.exe, 00000000.00000002.1828149453.000000000B64F000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbp source: file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbL source: file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbm source: file.exe, 00000000.00000002.1804928662.000000000A7AC000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbcT(/+ source: file.exe, 00000000.00000002.1886039128.000000000D552000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbx, source: file.exe, 00000000.00000002.1796538723.000000000A1A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1840251068.000000000BE11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1827638294.000000000B625000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1791505154.0000000009C0A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1804928662.000000000A7B1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1920109162.000000000E4CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1792549362.0000000009D8A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1886039128.000000000D552000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1900265086.000000000DD41000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1935143545.000000000EC7E000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb}P source: file.exe, 00000000.00000002.1828149453.000000000B64F000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb[ source: file.exe, 00000000.00000002.1792549362.0000000009D8A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\* source: file.exe, 00000000.00000002.1789802750.000000000140E000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbZ source: file.exe, 00000000.00000002.1920109162.000000000E494000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb[ source: file.exe, 00000000.00000002.1920109162.000000000E494000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb~t&+) source: file.exe, 00000000.00000002.1900265086.000000000DD41000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb] source: file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbX source: file.exe, 00000000.00000002.1815783208.000000000AEB4000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbI source: file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbJ source: file.exe, 00000000.00000002.1853909703.000000000C58A000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbM source: file.exe, 00000000.00000002.1840251068.000000000BE11000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1870641401.000000000CD9A000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF4EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW, |
0_2_00BF4EB2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF1DC9 FindFirstFileW,FindNextFileW, |
0_2_00BF1DC9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF1000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection, |
0_2_00BF1000 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF3F87 FindFirstFileW,FindNextFileW, |
0_2_00BF3F87 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00BF4145 FindFirstFileW,FindNextFileW, |
0_2_00BF4145 |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |