Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then cmp dword ptr [eax-08h], 5C3924FCh |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then lea esi, dword ptr [edx+ecx] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esi+08h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then jmp eax |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esi+04h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esp+000000A8h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, edi |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [0009DC58h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esp+10h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esi+08h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esi+04h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, edi |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then movzx eax, byte ptr [esi+ecx] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then test esi, esi |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then jmp ecx |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esp+28h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov ecx, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov eax, dword ptr [esi+00000080h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then jmp eax |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then jmp ecx |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then jmp ecx |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then add ecx, dword ptr [esp+eax*4+30h] |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 4x nop then mov edi, dword ptr [esi+0Ch] |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: Ag3ijL3z1w.exe | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: Ag3ijL3z1w.exe | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: Ag3ijL3z1w.exe | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1729643090.00000000030A2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1872445317.0000000000B24000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/ |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1712139420.0000000000A94000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1744190634.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000002.1877392777.0000000003084000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1705274256.0000000000A94000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/api |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1744935540.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1746473876.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1730645380.000000000308A000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1739179315.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1742531080.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1728879216.000000000308A000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1741194692.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1741869098.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1729089345.000000000308A000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1743172054.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1744190634.0000000003089000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/api0 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1771850830.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1765053909.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1764592696.0000000003089000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/api6 |
Source: Ag3ijL3z1w.exe, 00000000.00000002.1877392777.0000000003070000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/apiA |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1764742560.000000000308C000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1765258902.000000000308D000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1764592696.0000000003089000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1765053909.000000000308D000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1741282403.000000000308D000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1746883165.000000000308E000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1739179315.000000000308D000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1741194692.000000000308D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/api~ |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1705274256.0000000000AB8000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1712139420.0000000000AB8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/b |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1872445317.0000000000B24000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/l |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1872803431.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000002.1876372507.0000000000B2E000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1872445317.0000000000B24000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/s |
Source: Ag3ijL3z1w.exe, 00000000.00000002.1876372507.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1872445317.0000000000B24000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop/~ |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1720366524.000000000308C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://relevantvoicelesskw.shop:443/apiBE2NhtLOoTLNNgOkw |
Source: Ag3ijL3z1w.exe | String found in binary or memory: https://sectigo.com/CPS0 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1712600543.00000000030CE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.microsof |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713734255.00000000030A6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.microsoft. |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1730708871.0000000003192000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1730708871.0000000003192000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1712662411.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1712600543.00000000030CC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1712662411.00000000030A0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1712662411.00000000030C5000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1712600543.00000000030CC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1712662411.00000000030A0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1705221839.0000000000ADF000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1712139420.0000000000ADF000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1712321938.0000000000ADF000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1705205037.0000000000B24000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.cloudflare.com/5xx-error-landing |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1705221839.0000000000ADF000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1712139420.0000000000ADF000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1712321938.0000000000ADF000.00000004.00000020.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1705205037.0000000000B24000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/ |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1713273468.00000000030B7000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713220364.00000000030B9000.00000004.00000800.00020000.00000000.sdmp, Ag3ijL3z1w.exe, 00000000.00000003.1713354464.00000000030B7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1730708871.0000000003192000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1730708871.0000000003192000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1730708871.0000000003192000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1730708871.0000000003192000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: Ag3ijL3z1w.exe, 00000000.00000003.1730708871.0000000003192000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000820C1 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00074280 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000924B2 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000746B7 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000927AF NtOpenSection, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000967D0 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000927F1 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0009286A NtClose, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00092987 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00078E50 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00090F80 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007541A NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00095440 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00095640 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000756F7 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00095810 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007D860 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00095940 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00095BD0 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00095D40 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00096060 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00072277 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00096400 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00076492 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007C5F0 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00072700 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007C765 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007A762 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00076790 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007A880 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00092C52 NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00074D10 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007EDB2 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00080F04 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007CF46 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0008F1E0 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00091220 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00077305 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000914A0 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00091600 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007960A NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00091710 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00091840 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00091950 NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00095AB0 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00079C41 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00077C59 NtAllocateVirtualMemory,NtFreeVirtualMemory, |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00064640 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00083216 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000812E2 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007D860 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00096060 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00082382 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00096400 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000664F0 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0011A824 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_000668B4 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00086D8E |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00062E70 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00080F04 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007CF46 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00072F77 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0008EF80 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007F3FD |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00065477 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0007960A |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00061700 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00065717 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00083216 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00073A27 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00065A3C |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00077A8C |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00067B20 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00079C41 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00063C6F |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_002DDCD6 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_0006FDB0 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Code function: 0_2_00065F30 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: apphelp.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: winhttp.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: webio.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: mswsock.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: iphlpapi.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: winnsi.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: sspicli.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: dnsapi.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: rasadhlp.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: fwpuclnt.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: schannel.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: mskeyprotect.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ntasn1.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ncrypt.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ncryptsslp.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: msasn1.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: cryptsp.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: rsaenh.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: cryptbase.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: gpapi.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: dpapi.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: kernel.appcore.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: wbemcomn.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: amsi.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: userenv.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: profapi.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: version.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: wbemcomn.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: uxtheme.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\Application Data\Mozilla\Firefox |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001 |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\key4.db |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\CURQNKVOIX |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\GAOBCVIQIJ |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\IPKGELNTQY |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\SUAVTZKNFL |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\UOOJJOZIRH |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\CURQNKVOIX |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\DVWHKMNFNN |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\IPKGELNTQY |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\UOOJJOZIRH |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\SUAVTZKNFL |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\WUTJSCBCFX |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\CURQNKVOIX |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\DVWHKMNFNN |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\SUAVTZKNFL |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\UOOJJOZIRH |
Source: C:\Users\user\Desktop\Ag3ijL3z1w.exe | Directory queried: C:\Users\user\Documents\WUTJSCBCFX |