Source: |
Binary string: ntkrnlmp.pdb/ source: file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbUxi source: file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb&>G/- source: file.exe, 00000000.00000002.1894109859.000000000D74C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbW|k source: file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb;t source: file.exe, 00000000.00000002.1806662952.000000000B0F6000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb source: file.exe, 00000000.00000002.1869520671.000000000CFB3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1817983693.000000000B842000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1831076867.000000000C091000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1869520671.000000000CFBF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1894109859.000000000D74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1762944379.0000000008ED8000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb<.B1" source: file.exe, 00000000.00000002.1915819842.000000000DF59000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb: source: file.exe, 00000000.00000002.1818937151.000000000B890000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb source: file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1818937151.000000000B884000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1869520671.000000000CFBF000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb-4B source: file.exe, 00000000.00000002.1894109859.000000000D756000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb9z source: file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb8 source: file.exe, 00000000.00000002.1795920728.000000000A910000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbo source: file.exe, 00000000.00000002.1760644057.00000000007AF000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb=x source: file.exe, 00000000.00000002.1806662952.000000000B0EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb) source: file.exe, 00000000.00000002.1795920728.000000000A917000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb* source: file.exe, 00000000.00000002.1831076867.000000000C091000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb. source: file.exe, 00000000.00000002.1763849049.000000000904D000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbx, source: file.exe, 00000000.00000002.1806662952.000000000B0EE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1763849049.000000000904D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1869520671.000000000CFB3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1817983693.000000000B842000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1915819842.000000000DF59000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1767555678.0000000009406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1831076867.000000000C091000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1795920728.000000000A910000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1894109859.000000000D74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1762944379.0000000008ED8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb# source: file.exe, 00000000.00000002.1767555678.0000000009406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbP source: file.exe, 00000000.00000002.1831076867.000000000C09B000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb>"L=$ source: file.exe, 00000000.00000002.1915819842.000000000DF59000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb"JP source: file.exe, 00000000.00000002.1915819842.000000000DF66000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb<@ source: file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb+Do source: file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb" source: file.exe, 00000000.00000002.1795920728.000000000A917000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb<~ source: file.exe, 00000000.00000002.1806662952.000000000B0EE000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00291000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection, |
0_2_00291000 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00294EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW, |
0_2_00294EB2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00291DC9 FindFirstFileW,FindNextFileW, |
0_2_00291DC9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00294145 FindFirstFileW,FindNextFileW, |
0_2_00294145 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00293F87 FindFirstFileW,FindNextFileW, |
0_2_00293F87 |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.244.212.106 |
Source: file.exe, 00000000.00000002.1796832609.000000000AA57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: file.exe, 00000000.00000002.1796832609.000000000AA57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: file.exe, 00000000.00000002.1796832609.000000000AA57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: file.exe, 00000000.00000002.1796832609.000000000AA57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: file.exe, 00000000.00000002.1796832609.000000000AA57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: file.exe, 00000000.00000002.1796832609.000000000AA57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: file.exe, 00000000.00000002.1796832609.000000000AA57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: file.exe, 00000000.00000002.1766312611.00000000092CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: |
Binary string: ntkrnlmp.pdb/ source: file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbUxi source: file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb&>G/- source: file.exe, 00000000.00000002.1894109859.000000000D74C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdbW|k source: file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb;t source: file.exe, 00000000.00000002.1806662952.000000000B0F6000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb source: file.exe, 00000000.00000002.1869520671.000000000CFB3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1817983693.000000000B842000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1831076867.000000000C091000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1869520671.000000000CFBF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1894109859.000000000D74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1762944379.0000000008ED8000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb<.B1" source: file.exe, 00000000.00000002.1915819842.000000000DF59000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb: source: file.exe, 00000000.00000002.1818937151.000000000B890000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb source: file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1818937151.000000000B884000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1869520671.000000000CFBF000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb-4B source: file.exe, 00000000.00000002.1894109859.000000000D756000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb9z source: file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb8 source: file.exe, 00000000.00000002.1795920728.000000000A910000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbo source: file.exe, 00000000.00000002.1760644057.00000000007AF000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb=x source: file.exe, 00000000.00000002.1806662952.000000000B0EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb) source: file.exe, 00000000.00000002.1795920728.000000000A917000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb* source: file.exe, 00000000.00000002.1831076867.000000000C091000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb. source: file.exe, 00000000.00000002.1763849049.000000000904D000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbx, source: file.exe, 00000000.00000002.1806662952.000000000B0EE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1763849049.000000000904D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1869520671.000000000CFB3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1817983693.000000000B842000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1915819842.000000000DF59000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1767555678.0000000009406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1831076867.000000000C091000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1795920728.000000000A910000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1894109859.000000000D74C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1762944379.0000000008ED8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb# source: file.exe, 00000000.00000002.1767555678.0000000009406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1781980686.000000000A191000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdbP source: file.exe, 00000000.00000002.1831076867.000000000C09B000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb>"L=$ source: file.exe, 00000000.00000002.1915819842.000000000DF59000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb"JP source: file.exe, 00000000.00000002.1915819842.000000000DF66000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb<@ source: file.exe, 00000000.00000002.1773857010.0000000009A6C000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb+Do source: file.exe, 00000000.00000002.1846640773.000000000C7EE000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: ntkrnlmp.pdb" source: file.exe, 00000000.00000002.1795920728.000000000A917000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: WINLOA~1.PDBwinload_prod.pdb<~ source: file.exe, 00000000.00000002.1806662952.000000000B0EE000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00291000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection, |
0_2_00291000 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00294EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW, |
0_2_00294EB2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00291DC9 FindFirstFileW,FindNextFileW, |
0_2_00291DC9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00294145 FindFirstFileW,FindNextFileW, |
0_2_00294145 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00293F87 FindFirstFileW,FindNextFileW, |
0_2_00293F87 |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data |
Jump to behavior |