Source: firefox.exe, 00000021.00000002.2386659460.000001716F390000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com equals www.youtube.com (Youtube) |
Source: firefox.exe, 00000021.00000002.2386659460.000001716F390000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.comoL equals www.youtube.com (Youtube) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.facebook.com/video equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000025.00000002.2479302326.0000019401710000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video equals www.facebook.com (Facebook) |
Source: firefox.exe, 00000025.00000002.2479302326.0000019401710000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/videoa equals www.facebook.com (Facebook) |
Source: firefox.exe, 00000029.00000002.2400183079.000001CFAD7C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com --attempting-deelevation equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3103140639.0000000005D0F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: .www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: .www.linkedin.comDesktop/`17 equals www.linkedin.com (Linkedin) |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: .www.linkedin.comDesktops/ equals www.linkedin.com (Linkedin) |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: .www.linkedin.comon.txt equals www.linkedin.com (Linkedin) |
Source: firefox.exe, 00000021.00000003.2348096158.000001716F3AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: 2:o0`0https://www.youtube.com --attempting-deelevationUser equals www.youtube.com (Youtube) |
Source: firefox.exe, 00000025.00000003.2385982807.000001940172C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000025.00000003.2386246776.0000019401742000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000025.00000002.2479716309.0000019401743000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: 7n7https://www.facebook.com/video --attempting-deelevationUser equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.2570259682.0000025D9D760000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2569951826.0000025D9D793000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.2857902611.0000025DA1285000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2570259682.0000025D9D760000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2569951826.0000025D9D793000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CBE4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.2889197168.0000025D9CB20000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.3000180526.0000025DA747D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: </script><link rel="preload" href="https://i.ytimg.com/generate_204" as="fetch"><link as="script" rel="preload" href="https://www.youtube.com/s/desktop/bdb59273/jsbin/desktop_polymer.vflset/desktop_polymer.js" nonce="c40KzathyqN9OZzSpiA7sA"><script src="https://www.youtube.com/s/desktop/bdb59273/jsbin/web-animations-next-lite.min.vflset/web-animations-next-lite.min.js" nonce="c40KzathyqN9OZzSpiA7sA"></script><script src="https://www.youtube.com/s/desktop/bdb59273/jsbin/custom-elements-es5-adapter.vflset/c equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 00000009.00000003.2566880571.0000000005C0A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2516733304.0000000005D15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: =https://www.youtube.com/ equals www.youtube.com (Youtube) |
Source: firefox.exe, 00000025.00000002.2479302326.0000019401710000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: C:\Program Files\Mozilla Firefox\firefox.exehttps://www.facebook.com/video' equals www.facebook.com (Facebook) |
Source: firefox.exe, 00000021.00000002.2386659460.000001716F399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: C:\Program Files\Mozilla Firefox\firefox.exehttps://www.youtube.com equals www.youtube.com (Youtube) |
Source: firefox.exe, 00000029.00000002.2400183079.000001CFAD7C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: C:\Program Files\Mozilla Firefox\firefox.exehttps://www.youtube.com--attempting-deelevation equals www.youtube.com (Youtube) |
Source: firefox.exe, 00000025.00000002.2479302326.0000019401710000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/videoC:\Program Files\Mozilla Firefox\firefox.exeWinsta0\Default% equals www.facebook.com (Facebook) |
Source: firefox.exe, 00000021.00000002.2386659460.000001716F390000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.comC:\Program Files\Mozilla Firefox\firefox.exeWinsta0\Default+L equals www.youtube.com (Youtube) |
Source: firefox.exe, 00000029.00000002.2400183079.000001CFAD7C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: C:\Windows\system32\C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com --attempting-deelevationC:\Program Files\Mozilla Firefox\firefox.exeWinsta0\Default equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.2565805210.0000025DA2A50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: O^partitionKey=%28https%2Cyoutube.com%29,:https://www.youtube.com/ equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3103140639.0000000005D0F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000003.log equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3118921927.0000000007022000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOCK equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3118921927.0000000007022000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOCKFt,) equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3118921927.0000000007022000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001 equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-0000011> equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3103140639.0000000005D0F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000003.log equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3103140639.0000000005D0F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000003.log9z equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3103140639.0000000005D0F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000003.logghn){0 equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3102589706.0000000005B98000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3120396330.00000000071C2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOCK equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3102589706.0000000005B98000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3120396330.00000000071C2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001 equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001Set: equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: \Device\HarddiskVolume3\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001Si equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB3A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB3A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: about:certerror?e=nssBadCert&u=https%3A//www.youtube.com/&c=UTF-8&d=%20 equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000003.2516733304.0000000005D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://facebook.com/https://www.facebook.com/videofacebook.com/videoA equals www.facebook.com (Facebook) |
Source: MPGPH131.exe, 0000000A.00000003.2516733304.0000000005D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://facebook.com/https://www.facebook.com/videofacebook.com/videoB equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.3013298836.0000025DA333D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2570259682.0000025D9D760000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2569951826.0000025D9D793000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook) |
Source: MPGPH131.exe, 00000009.00000003.2566880571.0000000005C0A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/video equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/video( equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/video3 equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/videoG equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/videoU equals www.facebook.com (Facebook) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/videob equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DF2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.facebook.com/videoy equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp, PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.linkedin.com/login equals www.linkedin.com (Linkedin) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.linkedin.com/login[p equals www.linkedin.com (Linkedin) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.linkedin.com/login_s equals www.linkedin.com (Linkedin) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp, PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DF2000.00000004.00000020.00020000.00000000.sdmp, PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com equals www.youtube.com (Youtube) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com! equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp, PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.2877679617.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3008882516.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.2877679617.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3008882516.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter) |
Source: firefox.exe, 0000002A.00000003.2877679617.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3008882516.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/Q equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/d equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ei":{"c: equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/l8uJgji equals www.youtube.com (Youtube) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/y equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000003.2516733304.0000000005D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://youtube.com/https://www.youtube.com/youtube.com equals www.youtube.com (Youtube) |
Source: MPGPH131.exe, 0000000A.00000003.2516733304.0000000005D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://youtube.com/https://www.youtube.com/youtube.comQ equals www.youtube.com (Youtube) |
Source: firefox.exe, 00000025.00000003.2385982807.000001940172C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000025.00000002.2479302326.000001940173A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000025.00000003.2409319591.0000019401739000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: s://www.facebook.com/video --attempting-deelevation equals www.facebook.com (Facebook) |
Source: firefox.exe, 00000021.00000002.2386659460.000001716F399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: s://www.youtube.com --attempting-deelevation equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.3008882516.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: tlsflags0x00000000:www.facebook.com:443^partitionKey=%28https%2Cfacebook.com%29 equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: vs://www.facebook.com/video equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3015579017.0000025DA2F90000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3008882516.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: www.facebook.com"P# equals www.facebook.com (Facebook) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: www.linkedin.comZPk equals www.linkedin.com (Linkedin) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: www.linkedin.comdPa equals www.linkedin.com (Linkedin) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp, PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2559294871.0000025D9D690000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: www.youtube.com equals www.youtube.com (Youtube) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: www.youtube.comZ equals www.youtube.com (Youtube) |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: www.youtube.comv equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.2565805210.0000025DA2A50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: xO^partitionKey=%28https%2Cyoutube.com%29,:https://www.youtube.com/ equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: xabout:certerror?e=nssBadCert&u=https%3A//www.youtube.com/&c=UTF-8&d=%20 equals www.youtube.com (Youtube) |
Source: firefox.exe, 0000002A.00000003.3008882516.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: xtlsflags0x00000000:www.facebook.com:443^partitionKey=%28https%2Cfacebook.com%29 equals www.facebook.com (Facebook) |
Source: firefox.exe, 0000002A.00000003.2855426882.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3017006577.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1: |
Source: RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://13.46/cexe |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.0000000001104000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000002.2761057014.000000000605F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2588693585.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2586382834.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2514029667.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2582587481.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2591400353.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2603704872.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2571175674.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2605609465.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.000000000066B000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000077E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/fu.exe |
Source: MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/fu.exe(L |
Source: RageMP131.exe, 00000022.00000002.2657858021.000000000066B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/fu.exe22jBF8 |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/fu.exegerta |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.0000000001104000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/fu.exegertaA |
Source: RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/fu.exek |
Source: jk98mGM6JH.exe, 00000000.00000002.2761057014.000000000605F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/fu.exen |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000077E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/ladas.exe |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.0000000001104000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/ladas.exel |
Source: MPGPH131.exe, 00000009.00000003.2605609465.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3121450909.00000000072D9000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000077E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/niks.exe |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000077E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/niks.exeBuild: |
Source: MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/niks.exeJm(J |
Source: RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/niks.exed |
Source: RageMP131.exe, 00000022.00000002.2657858021.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exe |
Source: jk98mGM6JH.exe, 00000000.00000002.2761057014.00000000060A9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exe6 |
Source: jk98mGM6JH.exe, 00000000.00000002.2761057014.0000000006083000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exeAppData |
Source: MPGPH131.exe, 0000000A.00000002.3121450909.00000000072D9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exeX |
Source: MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exeb |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.0000000001104000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exee |
Source: jk98mGM6JH.exe, 00000000.00000002.2761057014.00000000060A9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exeles |
Source: RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/cost/well.exenBuil6N |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.0000000001104000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000002.2761057014.0000000006083000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2588693585.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2586382834.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2514029667.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2582587481.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2591400353.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2603704872.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2571175674.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2605609465.0000000000E76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3121450909.00000000072D9000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3120713333.000000000724C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/mine/plaza.exe |
Source: MPGPH131.exe, 0000000A.00000002.3120713333.000000000724C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/mine/plaza.exeRecorded |
Source: MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.46/mine/plaza.exet |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C483000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0; |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C483000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA740B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2876283032.0000025DA740B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2889982783.0000025D9B7DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2876283032.0000025DA741D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0 |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: firefox.exe, 0000002A.00000003.2567909028.0000025DA1292000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2846296858.0000025DA6B72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2857902611.0000025DA1285000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3007802806.0000025DA6B72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2868336724.0000025D9D769000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://detectportal.firefox.com |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://detectportal.firefox.com/canonical.html |
Source: firefox.exe, 0000002A.00000003.2868065030.0000025D9D792000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4 |
Source: firefox.exe, 0000002A.00000003.2868065030.0000025D9D792000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2888666753.0000025D9CBED000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6 |
Source: zqdrYwv5fC6zkQ9Tresm.exe, 00000019.00000002.2669069049.00000000013A9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://go.mic |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://json-schema.org/draft-04/schema# |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://json-schema.org/draft-06/schema# |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://json-schema.org/draft-07/schema#- |
Source: firefox.exe, 0000002A.00000003.2838482055.0000025DA704D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mozilla.o |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mozilla.org |
Source: firefox.exe, 0000002A.00000003.2997069473.0000025D9B62D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2969955150.0000025DA706D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2838482055.0000025DA7071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mozilla.org/ |
Source: firefox.exe, 0000002A.00000003.2567909028.0000025DA1292000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3001881155.0000025DA740B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2785555547.0000025D9827F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2982409537.0000025D98396000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2877038248.0000025D99B1B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2851446275.0000025DA3327000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3004996804.0000025DA7348000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2789678989.0000025D98B45000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2790125806.0000025D98BF6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2805681316.0000025D9889F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2836960295.0000025D983CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2616425023.0000025D988AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2784587168.0000025D98B34000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2684449918.0000025D98282000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2805681316.0000025D988B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2755939146.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2823879379.0000025D988B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2955573200.0000025D98BE4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2857902611.0000025DA1285000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2620749654.0000025DA117D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2670258020.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mozilla.org/MPL/2.0/. |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: firefox.exe, 0000002A.00000003.2877679617.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3008882516.0000025DA5FB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.pki.goog/ |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C483000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.pki.goog/gsr10) |
Source: firefox.exe, 0000002A.00000003.2857902611.0000025DA1285000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.pki.goog/gts1c3 |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA740B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2876283032.0000025DA740B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2889982783.0000025D9B7DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2876283032.0000025DA741D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.pki.goog/gts1c301 |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C483000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.pki.goog/gtsr100 |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2668233517.00000000014A1000.00000040.00000001.01000000.0000000D.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000000.2348106157.0000000001743000.00000080.00000001.01000000.0000000D.sdmp | String found in binary or memory: http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07 |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2668233517.00000000014A1000.00000040.00000001.01000000.0000000D.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000000.2348106157.0000000001743000.00000080.00000001.01000000.0000000D.sdmp | String found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2668233517.00000000014A1000.00000040.00000001.01000000.0000000D.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000000.2348106157.0000000001743000.00000080.00000001.01000000.0000000D.sdmp | String found in binary or memory: http://pki-ocsp.symauth.com0 |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C483000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pki.goog/gsr1/gsr1.crt02 |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA740B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2876283032.0000025DA740B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2889982783.0000025D9B7DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2876283032.0000025DA741D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0 |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C483000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04 |
Source: firefox.exe, 0000002A.00000003.2868987909.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://r3.i.lencr.org/0 |
Source: firefox.exe, 0000002A.00000003.2575167409.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://r3.i.lencr.org/0. |
Source: firefox.exe, 0000002A.00000003.2868987909.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2575167409.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://r3.o.lencr.org0 |
Source: firefox.exe, 0000002A.00000003.2576185535.0000025D9AB6B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul |
Source: jk98mGM6JH.exe, 00000000.00000003.2099303367.0000000004EE0000.00000004.00001000.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000002.2645200426.0000000000611000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000009.00000003.2159594281.00000000049A0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3050100739.0000000000391000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 0000000A.00000003.2161145290.0000000004BB0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000003.2269427007.00000000050A0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2539923574.0000000001001000.00000040.00000001.01000000.00000007.sdmp, RageMP131.exe, 00000022.00000003.2508379808.00000000049D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2670001934.0000000001001000.00000040.00000001.01000000.00000007.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2665861162.0000000000E51000.00000040.00000001.01000000.0000000D.sdmp | String found in binary or memory: http://www.winimage.com/zLibDll |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2868987909.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2575167409.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2868987909.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2575167409.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: firefox.exe, 0000002A.00000003.2480242544.0000025D98800000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2480764925.0000025D98A07000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2482353490.0000025D98A4A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.duckduckgo.com/ac/ |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185729135.0000000006063000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185578857.0000000006063000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: firefox.exe, 0000002A.00000003.2856989279.0000025DA12EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2889982783.0000025D9B7DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.firefox.com/ |
Source: firefox.exe, 0000002A.00000003.2864408444.0000025DA0F53000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.firefox.comK |
Source: firefox.exe, 0000002A.00000003.2888666753.0000025D9CBED000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com |
Source: firefox.exe, 0000002A.00000003.2565805210.0000025DA2A32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2566693202.0000025DA286F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2792132402.0000025D995D6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/ |
Source: firefox.exe, 0000002A.00000003.2868987909.0000025D9D449000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=ATuJsjxfLX6W |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/3 |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/C |
Source: firefox.exe, 0000002A.00000003.2880089736.0000025DA284E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2862799593.0000025DA1087000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3001881155.0000025DA7405000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https:// |
Source: MPGPH131.exe, 0000000A.00000002.3120615821.0000000007226000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3000180526.0000025DA7482000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2867490495.0000025D9D898000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2874737929.0000025D9C496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2867490495.0000025D9D8BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2889197168.0000025D9CB31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2880089736.0000025DA284E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2862799593.0000025DA1087000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com% |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/Yoc |
Source: firefox.exe, 0000002A.00000003.2862799593.0000025DA1087000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/moc.elgoog.stnuocca. |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/pp |
Source: firefox.exe, 0000002A.00000003.3017006577.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2880089736.0000025DA284E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&follo |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.com1 |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comB |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3529684760.0000000000990000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000027.00000002.2443870042.0000020FCB850000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comC: |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comP |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comQ |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comeo |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comeo6 |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comi |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comx |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comxv |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://accounts.google.comy |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://allegro.pl/ |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA7405000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://apis.google.com |
Source: firefox.exe, 0000002A.00000003.2755939146.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2670258020.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2781409848.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2824718699.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2701524214.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2808635227.0000025D9492F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21 |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185729135.0000000006063000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185578857.0000000006063000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185729135.0000000006063000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185578857.0000000006063000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185729135.0000000006063000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185578857.0000000006063000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: firefox.exe, 0000002A.00000003.2575885925.0000025D9CBED000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://completion.amazon.com/search/complete?q= |
Source: firefox.exe, 0000002A.00000003.2868987909.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2575167409.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://content-signature-2.cdn.mozilla.net |
Source: firefox.exe, 0000002A.00000003.2854870315.0000025DA2F7A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202 |
Source: firefox.exe, 0000002A.00000003.2878280004.0000025DA2EB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile.services.mozilla.com/v1/tiles |
Source: firefox.exe, 0000002A.00000003.3004996804.0000025DA7362000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://csp.withgoogle.com/csp/report-to/gse_qebhlk |
Source: firefox.exe, 0000002A.00000003.2668225406.0000025D95BC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2951582876.0000025D95B83000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi |
Source: firefox.exe, 0000002A.00000003.2570259682.0000025D9D760000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2480764925.0000025D98A07000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2961467272.0000025DA1156000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2482353490.0000025D98A4A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ |
Source: firefox.exe, 0000002A.00000003.2677411475.0000025D99913000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/Z |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: firefox.exe, 0000002A.00000003.2554771171.0000025DA30E5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/y |
Source: firefox.exe, 0000002A.00000003.2564308495.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2856459014.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2878599347.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/ |
Source: firefox.exe, 0000002A.00000003.2815986209.0000025D99B9E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2814873762.0000025D99B48000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2557310441.0000025DA70E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/673d2808-e5d8-41b9-957 |
Source: firefox.exe, 0000002A.00000003.2815986209.0000025D99B9E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2814873762.0000025D99B48000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2557310441.0000025DA70E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9 |
Source: firefox.exe, 0000002A.00000003.2856989279.0000025DA12EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2856459014.0000025DA2D4F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2878599347.0000025DA2D50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://firefox.settings.services.mozilla.com |
Source: firefox.exe, 0000002A.00000003.2888666753.0000025D9CBED000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/ |
Source: firefox.exe, 0000002A.00000003.3004996804.0000025DA7362000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/monitor/collections/changes/changeset?_expe |
Source: firefox.exe, 0000002A.00000003.2564308495.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2856459014.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2878599347.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.cdn.mozilla.net/ |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3013298836.0000025DA3316000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang= |
Source: firefox.exe, 0000002A.00000003.3013298836.0000025DA3316000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab? |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN |
Source: firefox.exe, 0000002A.00000003.3013298836.0000025DA3316000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/ |
Source: firefox.exe, 0000002A.00000003.3013298836.0000025DA3316000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/recommendations |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/recommendationsS |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/recommendationsS7 |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic |
Source: firefox.exe, 0000002A.00000003.2620749654.0000025DA117D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2591997474.0000025DA116F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts |
Source: firefox.exe, 0000002A.00000003.2620749654.0000025DA117D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2591997474.0000025DA116F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts |
Source: firefox.exe, 0000002A.00000003.2480242544.0000025D98800000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2480764925.0000025D98A07000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mozilla-services/screenshots |
Source: firefox.exe, 0000002A.00000003.2805681316.0000025D988DC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F38000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/zertosh/loose-envify) |
Source: firefox.exe, 0000002A.00000003.2575167409.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://google.com |
Source: firefox.exe, 0000002A.00000003.2880089736.0000025DA284E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://google.com/ |
Source: firefox.exe, 0000002A.00000003.3000180526.0000025DA747D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://i.ytimg.com/generate_204 |
Source: firefox.exe, 0000002A.00000003.2805681316.0000025D988B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2808309150.0000025D988B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ib.absa.co.za/ |
Source: firefox.exe, 0000002A.00000003.2865926671.0000025D9DB5C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://identity.mozilla.com/apps/oldsyncS |
Source: firefox.exe, 0000002A.00000003.2865926671.0000025D9DB5C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://identity.mozilla.com/cmd/H |
Source: firefox.exe, 0000002A.00000003.2865926671.0000025D9DB5C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://identity.mozilla.com/cmd/HCX |
Source: firefox.exe, 0000002A.00000003.2865926671.0000025D9DB5C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU |
Source: firefox.exe, 0000002A.00000003.2865926671.0000025D9DB5C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://img-getpocket.cdn.mozilla.net/X |
Source: firefox.exe, 0000002A.00000003.3011163448.0000025DA336F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://incoming.telemetry.mozilla.org |
Source: firefox.exe, 0000002A.00000003.2856459014.0000025DA2D7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2564308495.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://incoming.telemetry.mozilla.org/submit |
Source: firefox.exe, 0000002A.00000003.3000180526.0000025DA7482000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/9a79d70f-85b2-4e0d-986e-5df43 |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://incoming.telemetry.mozilla.org/submits |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C8F000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000BEE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C2B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.00000000006C2000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.000000000066B000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.0000000000767000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.0000000000773000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/ |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.00000000010BE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2514029667.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2571175674.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2588693585.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2591400353.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2605609465.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2582587481.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2603704872.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2586382834.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.00000000006C2000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.0000000000773000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/Mozilla/5.0 |
Source: RageMP131.exe, 0000000D.00000002.2536747684.0000000000C2B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/h |
Source: jk98mGM6JH.exe, 00000000.00000003.2099303367.0000000004EE0000.00000004.00001000.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000002.2645200426.0000000000611000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000009.00000003.2159594281.00000000049A0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3050100739.0000000000391000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 0000000A.00000003.2161145290.0000000004BB0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000003.2269427007.00000000050A0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2539923574.0000000001001000.00000040.00000001.01000000.00000007.sdmp, RageMP131.exe, 00000022.00000003.2508379808.00000000049D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2670001934.0000000001001000.00000040.00000001.01000000.00000007.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2665861162.0000000000E51000.00000040.00000001.01000000.0000000D.sdmp | String found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/o?iz |
Source: RageMP131.exe, 00000022.00000002.2657858021.000000000066B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/t8h |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000071E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/widget/demo/191.96.227.222 |
Source: RageMP131.exe, 0000000D.00000002.2536747684.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/widget/demo/191.96.227.222A |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.0000000000773000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/widget/demo/191.96.227.222D |
Source: RageMP131.exe, 0000000D.00000002.2536747684.0000000000C2B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/widget/demo/191.96.227.222I$ |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.000000000105E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2514029667.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2571175674.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2588693585.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2591400353.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2605609465.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2582587481.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2603704872.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2586382834.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.0000000000773000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io:443/widget/demo/191.96.227.222 |
Source: RageMP131.exe, 00000022.00000002.2657858021.00000000006C2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io:443/widget/demo/191.96.227.222lp |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://json-schema.org/draft/2019-09/schema |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://json-schema.org/draft/2019-09/schema. |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://json-schema.org/draft/2019-09/schema./ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://json-schema.org/draft/2020-12/schema/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB97000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://json-schema.org/draft/2020-12/schema/= |
Source: firefox.exe, 0000002A.00000003.2889197168.0000025D9CB20000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://location.services.mozilla.com/ |
Source: firefox.exe, 0000002A.00000003.2889982783.0000025D9B7DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb |
Source: firefox.exe, 0000002A.00000003.2844586974.0000025DA6B7C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://mitmdetection.services.mozilla.com |
Source: firefox.exe, 0000002A.00000003.2868065030.0000025D9D7D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://mitmdetection.services.mozilla.com/ |
Source: firefox.exe, 0000002A.00000003.2874737929.0000025D9C483000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2914161348.0000025D9CAF3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://pki.goog/repository/0 |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F38000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener) |
Source: firefox.exe, 0000002A.00000003.2855426882.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3017006577.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2& |
Source: firefox.exe, 0000002A.00000003.2575167409.0000025D9D449000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2868987909.0000025D9D449000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2 |
Source: firefox.exe, 0000002A.00000003.2855426882.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3017006577.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS |
Source: firefox.exe, 0000002A.00000003.2855426882.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3017006577.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy |
Source: firefox.exe, 0000002A.00000003.2480764925.0000025D98A07000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://screenshots.firefox.com/ |
Source: firefox.exe, 0000002A.00000003.2668225406.0000025D95BC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2951582876.0000025D95B83000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152 |
Source: firefox.exe, 0000002A.00000003.2878280004.0000025DA2EB8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon |
Source: firefox.exe, 0000002A.00000003.3017006577.0000025DA2EF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons- |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://shavar.services.mozilla.com/ |
Source: firefox.exe, 0000002A.00000003.2575167409.0000025D9D449000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2 |
Source: firefox.exe, 0000002A.00000003.2575167409.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2 |
Source: firefox.exe, 0000002A.00000003.2575167409.0000025D9D449000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2 |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA12C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2857534525.0000025DA12D2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://spocs.getpocket.com |
Source: firefox.exe, 0000002A.00000003.2564308495.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2856459014.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2878599347.0000025DA2D57000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://spocs.getpocket.com/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://spocs.getpocket.com/spocs |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://spocs.getpocket.com/spocs# |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://spocs.getpocket.com/spocs#l |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2864408444.0000025DA0F53000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://spocs.getpocket.com/user |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA7405000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ssl.gstatic.com |
Source: firefox.exe, 0000002A.00000003.2846608781.0000025DA5F68000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2877679617.0000025DA5F6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2868987909.0000025D9D449000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3008882516.0000025DA5F6F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.3015579017.0000025DA2F7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2854870315.0000025DA2F7A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/captive-portal |
Source: firefox.exe, 0000002A.00000003.2862799593.0000025DA1087000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: firefox.exe, 0000002A.00000003.2873842339.0000025D9CAFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2 |
Source: firefox.exe, 0000002A.00000003.2565805210.0000025DA2AA3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000BEE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000022.00000002.2657858021.000000000066B000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000071E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/RiseProSUPPORT |
Source: RageMP131.exe, 0000000D.00000002.2536747684.0000000000BEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/RiseProSUPPORT2 |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000071E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/RiseProSUPPORTMI |
Source: RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/risepro |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.00000000007C7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/risepro_bot |
Source: jk98mGM6JH.exe, 00000000.00000002.2670860055.0000000001104000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/risepro_bot& |
Source: MPGPH131.exe, 0000000A.00000003.2551332362.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2512497916.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2567719088.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2574783511.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2561440707.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2536830785.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/risepro_bot:d1 |
Source: Cr6QVRpzwqhYjtnCxFSW.exe, 00000028.00000002.2650610233.000000000077E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/risepro_botW |
Source: RageMP131.exe, 0000000D.00000002.2536747684.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/risepro_botuZ |
Source: RageMP131.exe, 00000022.00000002.2657858021.00000000006DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/riseprom |
Source: firefox.exe, 0000002A.00000003.2569951826.0000025D9D793000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://twitter.com/ |
Source: firefox.exe, 0000002A.00000003.2864530719.0000025DA0F38000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://webpack.js.org/concepts/mode/) |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.aliexpress.com/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.ca/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.co.uk/ |
Source: firefox.exe, 0000002A.00000003.2569951826.0000025D9D793000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/ |
Source: firefox.exe, 0000002A.00000003.2480242544.0000025D98800000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2857684648.0000025DA12A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2480764925.0000025D98A07000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2961467272.0000025DA1156000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2482353490.0000025D98A4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2489554800.0000025D94EBD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/exec/obidos/external-search/ |
Source: firefox.exe, 0000002A.00000003.2575167409.0000025D9D449000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.de/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.fr/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.avito.ru/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB3A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.baidu.com/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.bbc.co.uk/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB3A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ctrip.com/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB3A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ebay.co.uk/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ebay.de/ |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185729135.0000000006063000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185578857.0000000006063000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA7405000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google-analytics.com;report-uri |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA7405000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB3A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/ |
Source: firefox.exe, 0000002A.00000003.2533774985.0000025DA11BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2540341700.0000025DA11DA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/complete/search |
Source: firefox.exe, 0000002A.00000003.2480242544.0000025D98800000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2480764925.0000025D98A07000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2482353490.0000025D98A4A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/complete/search?client=firefox&q= |
Source: jk98mGM6JH.exe, 00000000.00000003.2182856234.0000000006048000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2189976218.0000000006075000.00000004.00000020.00020000.00000000.sdmp, jk98mGM6JH.exe, 00000000.00000003.2185089579.0000000006061000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2551384293.0000000005C1C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000009.00000003.2576867180.0000000005C46000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2553718200.0000000005D27000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: firefox.exe, 0000002A.00000003.2569951826.0000025D9D793000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2961467272.0000025DA1156000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2482353490.0000025D98A4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2489554800.0000025D94EBD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/search |
Source: firefox.exe, 0000002A.00000003.2789976360.0000025D98B7E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/search?client=firefox-b-d&q= |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA7405000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.googletagmanager.com |
Source: firefox.exe, 0000002A.00000003.3001881155.0000025DA7405000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ifeng.com/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.iqiyi.com/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.leboncoin.fr/ |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp, PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000D78000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.linkedin.com/login |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.linkedin.com/login_s |
Source: firefox.exe, 0000002A.00000003.2883620557.0000025D9D453000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2870621451.0000025D9D42F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: firefox.exe, 0000002A.00000003.2868987909.0000025D9D438000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2575167409.0000025D9D447000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/ |
Source: firefox.exe, 0000002A.00000003.2862799593.0000025DA1087000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle |
Source: firefox.exe, 0000002A.00000003.2815986209.0000025D99B9E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2814873762.0000025D99B48000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2557310441.0000025DA70E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/ |
Source: firefox.exe, 0000002A.00000003.2862799593.0000025DA1087000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ |
Source: firefox.exe, 0000002A.00000003.2565805210.0000025DA2AA3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP |
Source: firefox.exe, 0000002A.00000003.2574299512.0000025DA1249000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/V |
Source: firefox.exe, 0000002A.00000003.2874498443.0000025D9C4A4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.olx.pl/ |
Source: firefox.exe, 0000002A.00000003.2575885925.0000025D9CBED000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.reddit.com/ |
Source: firefox.exe, 0000002A.00000003.2838482055.0000025DA704D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.sling.com/ |
Source: firefox.exe, 0000002A.00000003.2871233509.0000025D9CB46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.wykop.pl/ |
Source: firefox.exe, 00000029.00000002.2400183079.000001CFAD7C0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2559294871.0000025D9D690000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2578860426.0000025D9D690000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2625854245.0000025D9D690000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2671231461.0000025D9D682000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2676333857.0000025D9D69E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2662734500.0000025D9D682000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: firefox.exe, 00000029.00000002.2400183079.000001CFAD7C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com--attempting-deelevation |
Source: firefox.exe, 0000002A.00000003.2569951826.0000025D9D793000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000002A.00000003.2806719806.0000025D995D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/Q |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/d |
Source: MPGPH131.exe, 0000000A.00000002.3106488836.0000000006342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ei |
Source: MPGPH131.exe, 0000000A.00000002.3078808474.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/l8uJgji |
Source: firefox.exe, 0000002A.00000003.3000180526.0000025DA747D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/s/desktop/bdb59273/jsbin/custom-elements-es5-adapter.vflset/c |
Source: firefox.exe, 0000002A.00000003.3000180526.0000025DA747D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/s/desktop/bdb59273/jsbin/desktop_polymer.vflset/desktop_polymer.js |
Source: firefox.exe, 0000002A.00000003.3000180526.0000025DA747D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/s/desktop/bdb59273/jsbin/web-animations-next-lite.min.vflset/web-animations- |
Source: PLO4plFr34jobsiEh08j.exe, 0000000F.00000002.3535890992.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/y |
Source: firefox.exe, 00000021.00000002.2386659460.000001716F390000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.comC: |
Source: firefox.exe, 00000021.00000002.2386659460.000001716F390000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.comoL |
Source: MPGPH131.exe, 00000009.00000003.2566880571.0000000005C05000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000000A.00000003.2516733304.0000000005D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://youtube.com/https://www.youtube.com/youtube.com |
Source: MPGPH131.exe, 0000000A.00000003.2516733304.0000000005D10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://youtube.com/https://www.youtube.com/youtube.comQ |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: gpedit.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: dssec.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: dsuiext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: authz.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: gpedit.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dssec.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dsuiext.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: authz.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: gpedit.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dssec.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dsuiext.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: authz.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: gpedit.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: activeds.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dssec.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dsuiext.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: framedynos.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: adsldpc.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: authz.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dsrole.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: logoncli.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ntdsapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: devobj.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: webio.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wsock32.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: windows.shell.servicehostbuilder.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: ieframe.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: netapi32.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wkscli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: secur32.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: mlang.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: policymanager.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: msvcp110_win.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: pcacli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: sfc_os.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: ieframe.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: netapi32.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wkscli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: ieframe.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: netapi32.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wkscli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: ieframe.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: netapi32.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: wkscli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: gpedit.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: activeds.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dssec.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dsuiext.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: framedynos.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: adsldpc.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: authz.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dsrole.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: logoncli.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ntdsapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: devobj.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: webio.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: shfolder.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: devobj.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: webio.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe | Section loaded: kernel.appcore.dll | |
Source: unknown | Process created: C:\Users\user\Desktop\jk98mGM6JH.exe C:\Users\user\Desktop\jk98mGM6JH.exe | |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST | |
Source: C:\Windows\SysWOW64\schtasks.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST | |
Source: C:\Windows\SysWOW64\schtasks.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe | |
Source: unknown | Process created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe | |
Source: unknown | Process created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" | |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe "C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe" | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.youtube.com/ | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.linkedin.com/login | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.facebook.com/video | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=1972,i,16301593684436752617,2012107364916416146,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1960,i,11993553605994081514,18162534353999161792,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://accounts.google.com/ | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1996,i,17726353602255924015,12176223097910466274,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1984,i,8973374208484498469,2501955192980366572,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe "C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe" | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.facebook.com/video | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.facebook.com/video | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2092,i,17673521410042216198,2537652209419044310,262144 /prefetch:3 | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com | |
Source: unknown | Process created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=2096,i,12923574770636312838,3728738922740556079,262144 /prefetch:3 | |
Source: unknown | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://www.youtube.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2160,i,17832719417900444124,13861847247960682782,262144 /prefetch:3 | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com | |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe "C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe" | |
Source: unknown | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com --attempting-deelevation | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2940 --field-trial-handle=2724,i,4482519872048150816,8688360613915830786,262144 /prefetch:3 | |
Source: unknown | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video --attempting-deelevation | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video | |
Source: unknown | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com --attempting-deelevation | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2292 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2188 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07a9cf11-a11c-4267-8dc4-740bf294e4fb} 3504 "\\.\pipe\gecko-crash-server-pipe.3504" 25d8896bf10 socket | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3484 -childID 1 -isForBrowser -prefsHandle 3428 -prefMapHandle 3432 -prefsLen 21837 -prefMapSize 238690 -jsInitHandle 1240 -jsInitLen 234236 -parentBuildID 20230927232528 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b753b1f8-541a-487d-8ec8-3be5703ede91} 3504 "\\.\pipe\gecko-crash-server-pipe.3504" 25d99d93310 tab | |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe "C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe "C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\zqdrYwv5fC6zkQ9Tresm.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe "C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\Cr6QVRpzwqhYjtnCxFSW.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\ProgramData\MPGPH131\MPGPH131.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.youtube.com/ | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.linkedin.com/login | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.facebook.com/video | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://accounts.google.com/ | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.facebook.com/video | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.facebook.com/video | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video | |
Source: C:\Users\user\AppData\Local\Temp\heidiVWl4S6kyYSYh\PLO4plFr34jobsiEh08j.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1960,i,11993553605994081514,18162534353999161792,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=1972,i,16301593684436752617,2012107364916416146,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1996,i,17726353602255924015,12176223097910466274,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1984,i,8973374208484498469,2501955192980366572,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2092,i,17673521410042216198,2537652209419044310,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=2096,i,12923574770636312838,3728738922740556079,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2160,i,17832719417900444124,13861847247960682782,262144 /prefetch:3 | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2940 --field-trial-handle=2724,i,4482519872048150816,8688360613915830786,262144 /prefetch:3 | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2292 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2188 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07a9cf11-a11c-4267-8dc4-740bf294e4fb} 3504 "\\.\pipe\gecko-crash-server-pipe.3504" 25d8896bf10 socket | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3484 -childID 1 -isForBrowser -prefsHandle 3428 -prefMapHandle 3432 -prefsLen 21837 -prefMapSize 238690 -jsInitHandle 1240 -jsInitLen 234236 -parentBuildID 20230927232528 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b753b1f8-541a-487d-8ec8-3be5703ede91} 3504 "\\.\pipe\gecko-crash-server-pipe.3504" 25d99d93310 tab | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/video | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: unknown unknown | |
Source: C:\Program Files\Mozilla Firefox\firefox.exe | Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com | |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008CF16A second address: 00000000008CF177 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008CF177 second address: 00000000008CF186 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F41B1011B46h 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D693F second address: 00000000008D6944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D6944 second address: 00000000008D694A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D694A second address: 00000000008D694E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D694E second address: 00000000008D6960 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F41B1011B46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007F41B1011B52h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D6C76 second address: 00000000008D6C7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D7164 second address: 00000000008D7168 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D7168 second address: 00000000008D71A3 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F41B1244246h 0x00000008 jmp 00007F41B1244251h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jnc 00007F41B1244246h 0x00000018 pushad 0x00000019 popad 0x0000001a jmp 00007F41B1244254h 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAC16 second address: 00000000008DAC43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 jmp 00007F41B1011B50h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F41B1011B4Fh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAC43 second address: 000000000075DA86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b ja 00007F41B124424Eh 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 jmp 00007F41B124424Ch 0x0000001a pop eax 0x0000001b jmp 00007F41B124424Ch 0x00000020 push dword ptr [ebp+122D1425h] 0x00000026 mov edi, dword ptr [ebp+122D2AEDh] 0x0000002c call dword ptr [ebp+122D265Dh] 0x00000032 pushad 0x00000033 mov dword ptr [ebp+122D3439h], ebx 0x00000039 xor eax, eax 0x0000003b jmp 00007F41B1244257h 0x00000040 mov edx, dword ptr [esp+28h] 0x00000044 jnc 00007F41B1244247h 0x0000004a mov dword ptr [ebp+122D2C65h], eax 0x00000050 mov dword ptr [ebp+122D2655h], eax 0x00000056 mov esi, 0000003Ch 0x0000005b jmp 00007F41B1244252h 0x00000060 mov dword ptr [ebp+122D2655h], ebx 0x00000066 add esi, dword ptr [esp+24h] 0x0000006a or dword ptr [ebp+122D1AA6h], ecx 0x00000070 lodsw 0x00000072 mov dword ptr [ebp+122D3439h], ebx 0x00000078 sub dword ptr [ebp+122D1891h], edi 0x0000007e add eax, dword ptr [esp+24h] 0x00000082 mov dword ptr [ebp+122D1891h], eax 0x00000088 mov ebx, dword ptr [esp+24h] 0x0000008c sub dword ptr [ebp+122D1AA6h], ecx 0x00000092 push eax 0x00000093 push ecx 0x00000094 push edx 0x00000095 push eax 0x00000096 push edx 0x00000097 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DACDF second address: 00000000008DAD07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov ecx, dword ptr [ebp+122D1B64h] 0x00000010 push 00000000h 0x00000012 mov si, cx 0x00000015 push 3B409471h 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d jc 00007F41B1011B46h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAD07 second address: 00000000008DAD62 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F41B1244256h 0x0000000b popad 0x0000000c xor dword ptr [esp], 3B4094F1h 0x00000013 mov dword ptr [ebp+122D1C14h], ecx 0x00000019 push 00000003h 0x0000001b push ebx 0x0000001c mov esi, dword ptr [ebp+122D2C31h] 0x00000022 pop edi 0x00000023 push 00000000h 0x00000025 mov edx, edi 0x00000027 push 00000003h 0x00000029 jmp 00007F41B1244254h 0x0000002e sbb ch, FFFFFFF0h 0x00000031 push 9837DAC7h 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 push edi 0x0000003a pop edi 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAD62 second address: 00000000008DAD66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAD66 second address: 00000000008DAD80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F41B1244252h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAEAC second address: 00000000008DAEDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jc 00007F41B1011B46h 0x0000000c jmp 00007F41B1011B4Bh 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push ebx 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 jp 00007F41B1011B46h 0x0000001e popad 0x0000001f pop ebx 0x00000020 mov eax, dword ptr [esp+04h] 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 pushad 0x00000028 popad 0x00000029 pushad 0x0000002a popad 0x0000002b popad 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAEDE second address: 00000000008DAEE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAEE4 second address: 00000000008DAEE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DAFE9 second address: 00000000008DB056 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244251h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jnp 00007F41B1244246h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 popad 0x00000014 add dword ptr [esp], 31D5AB7Bh 0x0000001b push 00000000h 0x0000001d push edx 0x0000001e call 00007F41B1244248h 0x00000023 pop edx 0x00000024 mov dword ptr [esp+04h], edx 0x00000028 add dword ptr [esp+04h], 00000014h 0x00000030 inc edx 0x00000031 push edx 0x00000032 ret 0x00000033 pop edx 0x00000034 ret 0x00000035 sub ecx, dword ptr [ebp+122D17FBh] 0x0000003b push 00000003h 0x0000003d movsx edx, cx 0x00000040 push 00000000h 0x00000042 mov ecx, dword ptr [ebp+122D2D59h] 0x00000048 cmc 0x00000049 push 00000003h 0x0000004b or dword ptr [ebp+122D340Ch], esi 0x00000051 call 00007F41B1244249h 0x00000056 push ebx 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DB056 second address: 00000000008DB05A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DB05A second address: 00000000008DB081 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 jmp 00007F41B1244252h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jo 00007F41B1244250h 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DB081 second address: 00000000008DB0BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 jc 00007F41B1011B51h 0x0000000f jmp 00007F41B1011B4Bh 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jc 00007F41B1011B59h 0x00000020 jmp 00007F41B1011B53h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008DB0BA second address: 00000000008DB0CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B124424Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008FAA0A second address: 00000000008FAA0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008FAA0E second address: 00000000008FAA14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008FAA14 second address: 00000000008FAA1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008FAA1C second address: 00000000008FAA20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D0D86 second address: 00000000008D0D8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D0D8B second address: 00000000008D0DBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F41B1244254h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F41B1244253h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008D0DBD second address: 00000000008D0DC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F8BE6 second address: 00000000008F8C2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1244254h 0x00000009 jns 00007F41B1244246h 0x0000000f push esi 0x00000010 pop esi 0x00000011 popad 0x00000012 pushad 0x00000013 jmp 00007F41B1244257h 0x00000018 push edi 0x00000019 pop edi 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d jl 00007F41B1244246h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F8C2C second address: 00000000008F8C30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F8C30 second address: 00000000008F8C34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F9022 second address: 00000000008F9027 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F9027 second address: 00000000008F9037 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F41B1244246h 0x0000000a jc 00007F41B1244246h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F9193 second address: 00000000008F919F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007F41B1011B46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F919F second address: 00000000008F91D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F41B1244258h 0x00000008 jmp 00007F41B1244254h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F91D0 second address: 00000000008F9212 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F41B1011B51h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jc 00007F41B1011B4Ch 0x00000013 js 00007F41B1011B5Ah 0x00000019 jmp 00007F41B1011B54h 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F936F second address: 00000000008F9373 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F9373 second address: 00000000008F938A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B53h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F938A second address: 00000000008F9396 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F9396 second address: 00000000008F939A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F939A second address: 00000000008F93CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244258h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F41B1244252h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F9547 second address: 00000000008F954B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F954B second address: 00000000008F954F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F954F second address: 00000000008F9555 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F96B6 second address: 00000000008F96BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F96BC second address: 00000000008F96C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F96C2 second address: 00000000008F96DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244254h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F982E second address: 00000000008F9847 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F41B1011B51h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F9847 second address: 00000000008F984B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F984B second address: 00000000008F984F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F984F second address: 00000000008F9855 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F999A second address: 00000000008F99A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008FA397 second address: 00000000008FA39D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008FCCE1 second address: 00000000008FCCFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F41B1011B46h 0x00000009 jmp 00007F41B1011B4Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009005B6 second address: 00000000009005BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009005BC second address: 00000000009005C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000901EE4 second address: 0000000000901F2C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F41B1244253h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F41B1244251h 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 push eax 0x00000016 jns 00007F41B124424Ch 0x0000001c pop eax 0x0000001d mov eax, dword ptr [eax] 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 jc 00007F41B1244246h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000901F2C second address: 0000000000901F36 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000901F36 second address: 0000000000901F3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000901F3A second address: 0000000000901F3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000908D21 second address: 0000000000908D27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000908EE4 second address: 0000000000908EEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000908EEA second address: 0000000000908F04 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F41B124424Ch 0x0000000a pop ecx 0x0000000b js 00007F41B124424Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009092C3 second address: 00000000009092DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1011B54h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009095C6 second address: 00000000009095CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090C1D8 second address: 000000000090C20D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B55h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F41B1011B59h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090C4D7 second address: 000000000090C4DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090C9DA second address: 000000000090C9E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090CB42 second address: 000000000090CB46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090CE3C second address: 000000000090CE40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090CE40 second address: 000000000090CE5D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244259h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090D000 second address: 000000000090D004 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090D004 second address: 000000000090D00A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090D0B2 second address: 000000000090D0B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090D0B6 second address: 000000000090D0C6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b xchg eax, ebx 0x0000000c pushad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090D0C6 second address: 000000000090D0E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 jmp 00007F41B1011B53h 0x0000000b pop esi 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090D0E9 second address: 000000000090D0EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090D56C second address: 000000000090D588 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B58h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090FA43 second address: 000000000090FA4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F41B1244246h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090F7CA second address: 000000000090F7E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jo 00007F41B1011B46h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090F7E3 second address: 000000000090F7E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090F7E9 second address: 000000000090F7F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1011B4Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091109A second address: 0000000000911122 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F41B1244246h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007F41B1244248h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000017h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b xor edi, 73417491h 0x00000031 sub esi, 4CFAEF31h 0x00000037 push 00000000h 0x00000039 call 00007F41B124424Dh 0x0000003e jmp 00007F41B1244251h 0x00000043 pop edi 0x00000044 push 00000000h 0x00000046 push 00000000h 0x00000048 push ebp 0x00000049 call 00007F41B1244248h 0x0000004e pop ebp 0x0000004f mov dword ptr [esp+04h], ebp 0x00000053 add dword ptr [esp+04h], 0000001Ch 0x0000005b inc ebp 0x0000005c push ebp 0x0000005d ret 0x0000005e pop ebp 0x0000005f ret 0x00000060 xchg eax, ebx 0x00000061 push eax 0x00000062 pushad 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000911122 second address: 0000000000911128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000911B4D second address: 0000000000911B89 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244250h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a nop 0x0000000b push esi 0x0000000c mov di, 6A76h 0x00000010 pop edi 0x00000011 push 00000000h 0x00000013 mov esi, eax 0x00000015 push 00000000h 0x00000017 mov dword ptr [ebp+122D1AFEh], eax 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F41B1244251h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091508D second address: 0000000000915092 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091512D second address: 0000000000915133 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000915133 second address: 0000000000915138 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000918158 second address: 0000000000918175 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244252h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000918175 second address: 0000000000918179 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091919A second address: 00000000009191A4 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F41B124424Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000917310 second address: 0000000000917314 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009182EC second address: 00000000009182F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000917314 second address: 000000000091731E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009182F1 second address: 000000000091836E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007F41B1244248h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 00000016h 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 jmp 00007F41B124424Ch 0x00000028 push dword ptr fs:[00000000h] 0x0000002f mov edi, 1ADFEEDBh 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b or bx, A9F6h 0x00000040 and bh, 00000000h 0x00000043 mov eax, dword ptr [ebp+122D0349h] 0x00000049 jl 00007F41B124424Ch 0x0000004f or edi, 1293C366h 0x00000055 or dword ptr [ebp+122D1A22h], ebx 0x0000005b push FFFFFFFFh 0x0000005d mov ebx, 5E184B38h 0x00000062 mov edi, dword ptr [ebp+122DB27Bh] 0x00000068 nop 0x00000069 push eax 0x0000006a js 00007F41B124424Ch 0x00000070 push eax 0x00000071 push edx 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091938C second address: 0000000000919399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009173EF second address: 00000000009173F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000919399 second address: 000000000091939D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091939D second address: 00000000009193A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091C474 second address: 000000000091C504 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B58h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a push eax 0x0000000b jmp 00007F41B1011B59h 0x00000010 nop 0x00000011 and edi, 519317C0h 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push edx 0x0000001c call 00007F41B1011B48h 0x00000021 pop edx 0x00000022 mov dword ptr [esp+04h], edx 0x00000026 add dword ptr [esp+04h], 0000001Ch 0x0000002e inc edx 0x0000002f push edx 0x00000030 ret 0x00000031 pop edx 0x00000032 ret 0x00000033 mov ebx, dword ptr [ebp+122D2F51h] 0x00000039 push 00000000h 0x0000003b jmp 00007F41B1011B53h 0x00000040 xchg eax, esi 0x00000041 push esi 0x00000042 jno 00007F41B1011B48h 0x00000048 pop esi 0x00000049 push eax 0x0000004a pushad 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091C504 second address: 000000000091C508 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091C649 second address: 000000000091C64E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091E398 second address: 000000000091E3A9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091E3A9 second address: 000000000091E3B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091F338 second address: 000000000091F347 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091F347 second address: 000000000091F34C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000921568 second address: 000000000092160B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244252h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F41B1244253h 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007F41B1244248h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 00000014h 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push edi 0x00000030 call 00007F41B1244248h 0x00000035 pop edi 0x00000036 mov dword ptr [esp+04h], edi 0x0000003a add dword ptr [esp+04h], 0000001Bh 0x00000042 inc edi 0x00000043 push edi 0x00000044 ret 0x00000045 pop edi 0x00000046 ret 0x00000047 jmp 00007F41B1244253h 0x0000004c push 00000000h 0x0000004e and ebx, dword ptr [ebp+122D2A31h] 0x00000054 push eax 0x00000055 push eax 0x00000056 push edx 0x00000057 jp 00007F41B1244258h 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091D6C1 second address: 000000000091D6C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091E514 second address: 000000000091E519 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000091E519 second address: 000000000091E51F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092259E second address: 00000000009225A8 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009235A2 second address: 00000000009235A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009235A6 second address: 00000000009235B4 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009235B4 second address: 00000000009235B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009235B8 second address: 00000000009235BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009244F6 second address: 00000000009244FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000923810 second address: 000000000092382A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F41B1244254h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092382A second address: 000000000092382E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000924727 second address: 000000000092472B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092B76A second address: 000000000092B770 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092B770 second address: 000000000092B774 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092B774 second address: 000000000092B77A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092B0B2 second address: 000000000092B0B7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092B0B7 second address: 000000000092B0CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jng 00007F41B1011B4Ah 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092B0CC second address: 000000000092B0D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092CD2B second address: 000000000092CD2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092CD2F second address: 000000000092CD48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007F41B124424Eh 0x0000000c pop ebx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092CD48 second address: 000000000092CD6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F41B1011B46h 0x0000000a jmp 00007F41B1011B55h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092CD6C second address: 000000000092CD7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B124424Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000092CD7B second address: 000000000092CD7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000934824 second address: 0000000000934872 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F41B1244254h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jne 00007F41B124424Eh 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 jmp 00007F41B1244253h 0x0000001b mov eax, dword ptr [eax] 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F41B124424Ah 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000934A06 second address: 0000000000934A0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000934A0A second address: 0000000000934A26 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244258h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000934A26 second address: 0000000000934A36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1011B4Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000934A36 second address: 0000000000934A4A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000934A4A second address: 0000000000934A62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B54h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000093968A second address: 0000000000939692 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000939692 second address: 00000000009396A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F41B1011B46h 0x0000000a ja 00007F41B1011B46h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009396A2 second address: 00000000009396BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244259h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009396BF second address: 00000000009396C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009396C9 second address: 00000000009396CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009396CD second address: 00000000009396D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009396D1 second address: 00000000009396D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008C1A88 second address: 00000000008C1A8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008C1A8C second address: 00000000008C1A94 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008C1A94 second address: 00000000008C1AC1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F41B1011B4Dh 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F41B1011B58h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008C1AC1 second address: 00000000008C1AC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008C1AC5 second address: 00000000008C1AC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000938992 second address: 00000000009389A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a ja 00007F41B1244246h 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009389A6 second address: 00000000009389D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jo 00007F41B1011B46h 0x0000000c pushad 0x0000000d popad 0x0000000e push edi 0x0000000f pop edi 0x00000010 jmp 00007F41B1011B51h 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jo 00007F41B1011B46h 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009389D5 second address: 00000000009389F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244258h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000938B62 second address: 0000000000938B69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000938B69 second address: 0000000000938B6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000938CBD second address: 0000000000938CC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000938CC3 second address: 0000000000938D16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244251h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F41B1244254h 0x0000000e popad 0x0000000f pushad 0x00000010 jmp 00007F41B124424Ch 0x00000015 jmp 00007F41B124424Ch 0x0000001a jbe 00007F41B1244248h 0x00000020 push eax 0x00000021 push edx 0x00000022 jns 00007F41B1244246h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009390DE second address: 00000000009390F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B52h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090A756 second address: 000000000090A75C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090A75C second address: 000000000090A760 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090A760 second address: 000000000090A764 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090A8E7 second address: 000000000090A8FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F41B1011B4Dh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090ABC0 second address: 000000000075DA86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244259h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push edx 0x0000000b pop edx 0x0000000c pop edi 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007F41B1244248h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 00000019h 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b push dword ptr [ebp+122D1425h] 0x00000031 xor dx, 8910h 0x00000036 call dword ptr [ebp+122D265Dh] 0x0000003c pushad 0x0000003d mov dword ptr [ebp+122D3439h], ebx 0x00000043 xor eax, eax 0x00000045 jmp 00007F41B1244257h 0x0000004a mov edx, dword ptr [esp+28h] 0x0000004e jnc 00007F41B1244247h 0x00000054 mov dword ptr [ebp+122D2C65h], eax 0x0000005a mov dword ptr [ebp+122D2655h], eax 0x00000060 mov esi, 0000003Ch 0x00000065 jmp 00007F41B1244252h 0x0000006a mov dword ptr [ebp+122D2655h], ebx 0x00000070 add esi, dword ptr [esp+24h] 0x00000074 or dword ptr [ebp+122D1AA6h], ecx 0x0000007a lodsw 0x0000007c mov dword ptr [ebp+122D3439h], ebx 0x00000082 sub dword ptr [ebp+122D1891h], edi 0x00000088 add eax, dword ptr [esp+24h] 0x0000008c mov dword ptr [ebp+122D1891h], eax 0x00000092 mov ebx, dword ptr [esp+24h] 0x00000096 sub dword ptr [ebp+122D1AA6h], ecx 0x0000009c push eax 0x0000009d push ecx 0x0000009e push edx 0x0000009f push eax 0x000000a0 push edx 0x000000a1 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090ACDB second address: 000000000090ACF6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F41B1011B51h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090ACF6 second address: 000000000090ACFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090ACFC second address: 000000000075DA86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007F41B1011B48h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 jmp 00007F41B1011B51h 0x0000002b push dword ptr [ebp+122D1425h] 0x00000031 mov cl, dh 0x00000033 call dword ptr [ebp+122D265Dh] 0x00000039 pushad 0x0000003a mov dword ptr [ebp+122D3439h], ebx 0x00000040 xor eax, eax 0x00000042 jmp 00007F41B1011B57h 0x00000047 mov edx, dword ptr [esp+28h] 0x0000004b jnc 00007F41B1011B47h 0x00000051 mov dword ptr [ebp+122D2C65h], eax 0x00000057 mov dword ptr [ebp+122D2655h], eax 0x0000005d mov esi, 0000003Ch 0x00000062 jmp 00007F41B1011B52h 0x00000067 mov dword ptr [ebp+122D2655h], ebx 0x0000006d add esi, dword ptr [esp+24h] 0x00000071 or dword ptr [ebp+122D1AA6h], ecx 0x00000077 lodsw 0x00000079 mov dword ptr [ebp+122D3439h], ebx 0x0000007f sub dword ptr [ebp+122D1891h], edi 0x00000085 add eax, dword ptr [esp+24h] 0x00000089 mov dword ptr [ebp+122D1891h], eax 0x0000008f mov ebx, dword ptr [esp+24h] 0x00000093 sub dword ptr [ebp+122D1AA6h], ecx 0x00000099 push eax 0x0000009a push ecx 0x0000009b push edx 0x0000009c push eax 0x0000009d push edx 0x0000009e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B024 second address: 000000000090B02E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B02E second address: 000000000090B033 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B131 second address: 000000000090B135 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B135 second address: 000000000090B13B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B256 second address: 000000000090B2A0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push ebx 0x0000000a mov ecx, 690FF56Ch 0x0000000f pop ecx 0x00000010 push 00000004h 0x00000012 push 00000000h 0x00000014 push edx 0x00000015 call 00007F41B1244248h 0x0000001a pop edx 0x0000001b mov dword ptr [esp+04h], edx 0x0000001f add dword ptr [esp+04h], 00000018h 0x00000027 inc edx 0x00000028 push edx 0x00000029 ret 0x0000002a pop edx 0x0000002b ret 0x0000002c sub dword ptr [ebp+122D37DDh], ecx 0x00000032 push eax 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 jmp 00007F41B124424Dh 0x0000003b pop eax 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B125 second address: 000000000090B131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B88D second address: 000000000090B891 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008F0A1B second address: 00000000008F0A38 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007F41B1011B55h 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000093FB8B second address: 000000000093FB95 instructions: 0x00000000 rdtsc 0x00000002 js 00007F41B1244246h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000093FDF7 second address: 000000000093FE18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007F41B1011B54h 0x0000000a jo 00007F41B1011B46h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944A3D second address: 0000000000944A47 instructions: 0x00000000 rdtsc 0x00000002 js 00007F41B124424Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944A47 second address: 0000000000944A4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944A4F second address: 0000000000944A55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944BA5 second address: 0000000000944BA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944BA9 second address: 0000000000944BBA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jp 00007F41B1244246h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944D0A second address: 0000000000944D13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944D13 second address: 0000000000944D21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B124424Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000945185 second address: 00000000009451A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F41B1011B4Ch 0x0000000e jne 00007F41B1011B46h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009451A0 second address: 00000000009451A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009451A4 second address: 00000000009451AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009451AA second address: 00000000009451B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009451B5 second address: 00000000009451C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F41B1011B46h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009451C0 second address: 00000000009451C5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000944761 second address: 000000000094477A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1011B53h 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094477A second address: 000000000094477E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009455FF second address: 0000000000945616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1011B53h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D244 second address: 000000000094D248 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094BC98 second address: 000000000094BC9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C0F1 second address: 000000000094C10A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F41B124424Fh 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C10A second address: 000000000094C10E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C262 second address: 000000000094C26E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jnl 00007F41B1244246h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C26E second address: 000000000094C295 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F41B1011B5Dh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C295 second address: 000000000094C2AB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F41B1244250h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C51E second address: 000000000094C522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C522 second address: 000000000094C52F instructions: 0x00000000 rdtsc 0x00000002 jns 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C64E second address: 000000000094C66B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jmp 00007F41B1011B4Bh 0x0000000b push edi 0x0000000c pop edi 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 pushad 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 push esi 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094C797 second address: 000000000094C7C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Bh 0x00000007 jmp 00007F41B124424Eh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CA6C second address: 000000000094CA84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F41B1011B52h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CA84 second address: 000000000094CA9F instructions: 0x00000000 rdtsc 0x00000002 jc 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jnc 00007F41B1244246h 0x00000011 pushad 0x00000012 popad 0x00000013 pop eax 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CA9F second address: 000000000094CAA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CAA3 second address: 000000000094CAE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244258h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F41B1244251h 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F41B124424Dh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CC2F second address: 000000000094CC39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ecx 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CC39 second address: 000000000094CC4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F41B1244246h 0x0000000a pop esi 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CC4A second address: 000000000094CC53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CC53 second address: 000000000094CC70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1244259h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094CC70 second address: 000000000094CC76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D07C second address: 000000000094D08A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 push esi 0x00000009 pop esi 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D08A second address: 000000000094D08F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D08F second address: 000000000094D095 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D095 second address: 000000000094D099 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D099 second address: 000000000094D09D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D09D second address: 000000000094D0B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jng 00007F41B1011B4Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 jp 00007F41B1011B46h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000094D0B8 second address: 000000000094D0CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007F41B1244246h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d js 00007F41B1244246h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008CBC4A second address: 00000000008CBC50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008CBC50 second address: 00000000008CBC54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009529FC second address: 0000000000952A00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000952A00 second address: 0000000000952A19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F41B1244253h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000952A19 second address: 0000000000952A1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000952A1E second address: 0000000000952A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009555F3 second address: 000000000095560A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F41B1011B4Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095560A second address: 0000000000955610 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000955733 second address: 0000000000955740 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 push edx 0x00000008 pop edx 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009571DC second address: 00000000009571E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009571E4 second address: 00000000009571F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jns 00007F41B1011B52h 0x0000000b jnl 00007F41B1011B46h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009571F7 second address: 00000000009571FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009571FB second address: 0000000000957200 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095CE0F second address: 000000000095CE22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007F41B1244246h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095CF57 second address: 000000000095CF5D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095D0B4 second address: 000000000095D0BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F41B1244246h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095D0BE second address: 000000000095D0C8 instructions: 0x00000000 rdtsc 0x00000002 js 00007F41B1011B4Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095D0C8 second address: 000000000095D0D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095D0D4 second address: 000000000095D0DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095D54B second address: 000000000095D550 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B40A second address: 000000000090B40E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B40E second address: 000000000090B45F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 nop 0x00000008 mov ebx, dword ptr [ebp+12480477h] 0x0000000e mov dword ptr [ebp+122D180Ch], eax 0x00000014 add eax, ebx 0x00000016 push 00000000h 0x00000018 push ecx 0x00000019 call 00007F41B1244248h 0x0000001e pop ecx 0x0000001f mov dword ptr [esp+04h], ecx 0x00000023 add dword ptr [esp+04h], 00000016h 0x0000002b inc ecx 0x0000002c push ecx 0x0000002d ret 0x0000002e pop ecx 0x0000002f ret 0x00000030 mov edx, dword ptr [ebp+122D2A51h] 0x00000036 push eax 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a jl 00007F41B1244246h 0x00000040 jmp 00007F41B124424Ch 0x00000045 popad 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B45F second address: 000000000090B4D4 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F41B1011B48h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007F41B1011B48h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 0000001Dh 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 adc cx, 2800h 0x0000002c push 00000004h 0x0000002e push 00000000h 0x00000030 push ebp 0x00000031 call 00007F41B1011B48h 0x00000036 pop ebp 0x00000037 mov dword ptr [esp+04h], ebp 0x0000003b add dword ptr [esp+04h], 00000016h 0x00000043 inc ebp 0x00000044 push ebp 0x00000045 ret 0x00000046 pop ebp 0x00000047 ret 0x00000048 nop 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007F41B1011B59h 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000090B4D4 second address: 000000000090B4F2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F41B1244248h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jo 00007F41B1244248h 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 ja 00007F41B1244246h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095D82D second address: 000000000095D83D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push esi 0x00000008 jo 00007F41B1011B5Fh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095E2A5 second address: 000000000095E2BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F41B1244251h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095E2BC second address: 000000000095E2DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B53h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push esi 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095E2DD second address: 000000000095E2ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jng 00007F41B1244246h 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000095E2ED second address: 000000000095E319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1011B4Eh 0x00000009 jmp 00007F41B1011B58h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000008CD781 second address: 00000000008CD785 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000961AA0 second address: 0000000000961AB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Ch 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000961AB1 second address: 0000000000961AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000961AC3 second address: 0000000000961AD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B52h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964B70 second address: 0000000000964BC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jno 00007F41B124425Ah 0x0000000f jmp 00007F41B1244253h 0x00000014 jg 00007F41B1244252h 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964BC4 second address: 0000000000964BCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964BCA second address: 0000000000964BDA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964BDA second address: 0000000000964BF8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F41B1011B4Ch 0x00000008 pushad 0x00000009 jmp 00007F41B1011B4Dh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964BF8 second address: 0000000000964C00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964EA9 second address: 0000000000964EC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F41B1011B46h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007F41B1011B46h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964EC0 second address: 0000000000964EC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964EC4 second address: 0000000000964ED3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F41B1011B46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964ED3 second address: 0000000000964F03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F41B1244246h 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jg 00007F41B124424Eh 0x00000014 jmp 00007F41B1244254h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000964F03 second address: 0000000000964F2B instructions: 0x00000000 rdtsc 0x00000002 jns 00007F41B1011B61h 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B35E second address: 000000000096B362 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B362 second address: 000000000096B366 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B366 second address: 000000000096B388 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F41B1244246h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jnl 00007F41B1244256h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B388 second address: 000000000096B38D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B38D second address: 000000000096B393 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B8AC second address: 000000000096B8F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F41B1011B46h 0x00000009 pushad 0x0000000a popad 0x0000000b je 00007F41B1011B46h 0x00000011 popad 0x00000012 pushad 0x00000013 push edx 0x00000014 pop edx 0x00000015 jmp 00007F41B1011B52h 0x0000001a pushad 0x0000001b popad 0x0000001c popad 0x0000001d pop edx 0x0000001e pop eax 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F41B1011B4Dh 0x00000027 jmp 00007F41B1011B4Eh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B8F6 second address: 000000000096B8FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B8FA second address: 000000000096B90F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F41B1011B4Ch 0x0000000c jl 00007F41B1011B46h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096B90F second address: 000000000096B91B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096BBB4 second address: 000000000096BBFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jmp 00007F41B1011B52h 0x0000000b push edx 0x0000000c pop edx 0x0000000d popad 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 jmp 00007F41B1011B4Ah 0x0000001d pushad 0x0000001e jmp 00007F41B1011B54h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096BEB6 second address: 000000000096BEBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096BEBC second address: 000000000096BEC2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096BEC2 second address: 000000000096BEF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 jno 00007F41B1244246h 0x0000000f jg 00007F41B1244246h 0x00000015 jmp 00007F41B1244257h 0x0000001a popad 0x0000001b pop esi 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096BEF5 second address: 000000000096BEF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096BEF9 second address: 000000000096BF02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096C4A1 second address: 000000000096C4A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000096C4A5 second address: 000000000096C4C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244257h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000971A38 second address: 0000000000971A57 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F41B1011B46h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F41B1011B50h 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000971A57 second address: 0000000000971A7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c jmp 00007F41B1244259h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000971A7C second address: 0000000000971A8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F41B1011B4Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000974EB5 second address: 0000000000974EDB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F41B124424Bh 0x00000008 jmp 00007F41B124424Ch 0x0000000d pop ebx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jbe 00007F41B1244246h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000974EDB second address: 0000000000974F07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jne 00007F41B1011B52h 0x00000010 push esi 0x00000011 je 00007F41B1011B46h 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a jnc 00007F41B1011B46h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009751CD second address: 00000000009751D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009751D1 second address: 000000000097520A instructions: 0x00000000 rdtsc 0x00000002 jc 00007F41B1011B5Dh 0x00000008 jmp 00007F41B1011B4Bh 0x0000000d jmp 00007F41B1011B4Ch 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F41B1011B4Eh 0x0000001d jo 00007F41B1011B46h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097520A second address: 0000000000975223 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244255h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000975223 second address: 000000000097523D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F41B1011B46h 0x00000009 jmp 00007F41B1011B4Fh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000975388 second address: 00000000009753CC instructions: 0x00000000 rdtsc 0x00000002 jne 00007F41B124424Eh 0x00000008 js 00007F41B124424Eh 0x0000000e pushad 0x0000000f popad 0x00000010 ja 00007F41B1244246h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 jo 00007F41B1244274h 0x0000001e jng 00007F41B124425Bh 0x00000024 jmp 00007F41B1244255h 0x00000029 push ecx 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097B688 second address: 000000000097B6C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F41B1011B59h 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e jmp 00007F41B1011B50h 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 pop esi 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097B6C1 second address: 000000000097B6C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097B6C7 second address: 000000000097B6CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097B6CB second address: 000000000097B6E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Fh 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097BA03 second address: 000000000097BA07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097BF95 second address: 000000000097BF9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097BF9D second address: 000000000097BFAE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 jbe 00007F41B1011B46h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097BFAE second address: 000000000097BFB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097C42E second address: 000000000097C444 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B52h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097C444 second address: 000000000097C452 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F41B124424Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097C452 second address: 000000000097C456 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097C456 second address: 000000000097C45D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097C45D second address: 000000000097C466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097C466 second address: 000000000097C46A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000097CB89 second address: 000000000097CBA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F41B1011B52h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000098123E second address: 000000000098124F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007F41B1244248h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000098124F second address: 0000000000981269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1011B56h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000985AC8 second address: 0000000000985AD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000985DB7 second address: 0000000000985DCB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B50h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000985DCB second address: 0000000000985DE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pushad 0x0000000b jne 00007F41B1244246h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 popad 0x00000015 jo 00007F41B1244264h 0x0000001b push edi 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000985DE9 second address: 0000000000985DEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000098D23D second address: 000000000098D243 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000098D243 second address: 000000000098D247 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000098D247 second address: 000000000098D24C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000997DB2 second address: 0000000000997DDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jno 00007F41B1011B56h 0x0000000c popad 0x0000000d push ebx 0x0000000e push ebx 0x0000000f jns 00007F41B1011B46h 0x00000015 push edx 0x00000016 pop edx 0x00000017 pop ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000997912 second address: 0000000000997919 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000997AAF second address: 0000000000997AB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099A7E5 second address: 000000000099A7EC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099A7EC second address: 000000000099A810 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jl 00007F41B1011B46h 0x0000000c jmp 00007F41B1011B51h 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push esi 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099A200 second address: 000000000099A21D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244255h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099A21D second address: 000000000099A221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EE7E second address: 000000000099EE84 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EE84 second address: 000000000099EEA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F41B1011B58h 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EEA4 second address: 000000000099EEBE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jns 00007F41B1244246h 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop edi 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jg 00007F41B1244246h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EEBE second address: 000000000099EEC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EEC2 second address: 000000000099EEC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EEC6 second address: 000000000099EED2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F41B1011B46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EED2 second address: 000000000099EEE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B124424Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EEE2 second address: 000000000099EEFD instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jbe 00007F41B1011B46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F41B1011B4Dh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000099EEFD second address: 000000000099EF01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009AA8EF second address: 00000000009AA8F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009AA736 second address: 00000000009AA77B instructions: 0x00000000 rdtsc 0x00000002 jo 00007F41B1244261h 0x00000008 jnp 00007F41B1244246h 0x0000000e jmp 00007F41B1244255h 0x00000013 jmp 00007F41B124424Dh 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F41B1244251h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009ACCC0 second address: 00000000009ACCEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F41B1011B4Dh 0x00000008 jmp 00007F41B1011B4Ah 0x0000000d push edx 0x0000000e pop edx 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jo 00007F41B1011B46h 0x00000018 jo 00007F41B1011B46h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009ACCEB second address: 00000000009ACCEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009ACCEF second address: 00000000009ACD0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1011B4Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009ACD0C second address: 00000000009ACD2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1244258h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009ACD2A second address: 00000000009ACD2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009ACB6B second address: 00000000009ACB6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009ACB6F second address: 00000000009ACB8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F41B1011B56h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B5BD3 second address: 00000000009B5BF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F41B1244253h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B5BF1 second address: 00000000009B5BF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B5BF5 second address: 00000000009B5BF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B477F second address: 00000000009B4783 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4783 second address: 00000000009B4795 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c push esi 0x0000000d pop esi 0x0000000e pop edi 0x0000000f push ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4A16 second address: 00000000009B4A43 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F41B1011B61h 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F41B1011B46h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4A43 second address: 00000000009B4A47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4B91 second address: 00000000009B4B97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4B97 second address: 00000000009B4B9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4D10 second address: 00000000009B4D29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F41B1011B4Dh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4E94 second address: 00000000009B4E98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B4E98 second address: 00000000009B4E9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B967B second address: 00000000009B967F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B927A second address: 00000000009B9280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B9280 second address: 00000000009B9285 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009B9285 second address: 00000000009B92A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B50h 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007F41B1011B46h 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009CDE27 second address: 00000000009CDE2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009CDE2B second address: 00000000009CDE35 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F41B1011B46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009CDE35 second address: 00000000009CDE3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009CDE3B second address: 00000000009CDE3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009CDE3F second address: 00000000009CDE76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F41B1244254h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push ecx 0x0000000e jnp 00007F41B1244257h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009D05F5 second address: 00000000009D0639 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F41B1011B57h 0x0000000e je 00007F41B1011B61h 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007F41B1011B59h 0x0000001b push eax 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009C9DAA second address: 00000000009C9DB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000009C9DB5 second address: 00000000009C9DC8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A04B68 second address: 0000000000A04B6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A04B6C second address: 0000000000A04B8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jg 00007F41B1011B4Eh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A04CF4 second address: 0000000000A04D0B instructions: 0x00000000 rdtsc 0x00000002 jg 00007F41B1244246h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push esi 0x0000000c pop esi 0x0000000d pop ecx 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 push edx 0x00000016 pop edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A04D0B second address: 0000000000A04D23 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F41B1011B52h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A04D23 second address: 0000000000A04D52 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 jns 00007F41B1244246h 0x0000000b pop edi 0x0000000c pushad 0x0000000d jmp 00007F41B124424Ch 0x00000012 jmp 00007F41B1244254h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A05056 second address: 0000000000A05064 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007F41B1011B4Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A051C5 second address: 0000000000A051FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007F41B1244259h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F41B1244257h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A08632 second address: 0000000000A08636 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A088BF second address: 0000000000A088C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A088C5 second address: 0000000000A08930 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007F41B1011B48h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000018h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 mov dx, 514Bh 0x0000002c push 00000004h 0x0000002e add edx, dword ptr [ebp+1244A582h] 0x00000034 mov edx, ebx 0x00000036 call 00007F41B1011B49h 0x0000003b jnl 00007F41B1011B56h 0x00000041 push eax 0x00000042 pushad 0x00000043 push eax 0x00000044 push edx 0x00000045 push esi 0x00000046 pop esi 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A08930 second address: 0000000000A08952 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c popad 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 pushad 0x00000012 jmp 00007F41B124424Dh 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A08952 second address: 0000000000A0898E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41B1011B4Ah 0x00000009 popad 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d jmp 00007F41B1011B55h 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 pushad 0x00000017 push ecx 0x00000018 jns 00007F41B1011B46h 0x0000001e pop ecx 0x0000001f push eax 0x00000020 push edx 0x00000021 jp 00007F41B1011B46h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A08BF3 second address: 0000000000A08BF8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A0B5F2 second address: 0000000000A0B602 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pushad 0x00000008 jno 00007F41B1011B46h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A0B602 second address: 0000000000A0B608 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A0B608 second address: 0000000000A0B63A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jnl 00007F41B1011B4Eh 0x0000000d push ebx 0x0000000e pushad 0x0000000f popad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 pop ebx 0x00000013 je 00007F41B1011B52h 0x00000019 jmp 00007F41B1011B4Ch 0x0000001e push ebx 0x0000001f push edi 0x00000020 pop edi 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000000A0D5E7 second address: 0000000000A0D5FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244250h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050F0703 second address: 00000000050F0707 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050F0707 second address: 00000000050F070D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050F070D second address: 00000000050F0713 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050F0713 second address: 00000000050F0741 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244251h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov ecx, 4B0DD3E3h 0x00000012 pushad 0x00000013 push ecx 0x00000014 pop ebx 0x00000015 mov di, si 0x00000018 popad 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050F0741 second address: 00000000050F0745 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050F0745 second address: 00000000050F074B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050F074B second address: 00000000050F0779 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B50h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F41B1011B57h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130644 second address: 0000000005130685 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F41B1244256h 0x0000000f mov ebp, esp 0x00000011 jmp 00007F41B1244250h 0x00000016 pop ebp 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a mov ecx, 4B4E9303h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050C0B72 second address: 00000000050C0B76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050C0B76 second address: 00000000050C0B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050C0B7C second address: 00000000050C0C37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F41B1011B55h 0x00000009 adc esi, 3FA36836h 0x0000000f jmp 00007F41B1011B51h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push esp 0x00000019 jmp 00007F41B1011B4Ah 0x0000001e mov dword ptr [esp], ebp 0x00000021 jmp 00007F41B1011B50h 0x00000026 mov ebp, esp 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007F41B1011B4Eh 0x0000002f adc cx, C1B8h 0x00000034 jmp 00007F41B1011B4Bh 0x00000039 popfd 0x0000003a pushfd 0x0000003b jmp 00007F41B1011B58h 0x00000040 sub esi, 4FBA7C18h 0x00000046 jmp 00007F41B1011B4Bh 0x0000004b popfd 0x0000004c popad 0x0000004d push dword ptr [ebp+04h] 0x00000050 push eax 0x00000051 push edx 0x00000052 jmp 00007F41B1011B55h 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100B09 second address: 0000000005100B0F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100B0F second address: 0000000005100B55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B54h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F41B1011B4Dh 0x00000013 add ecx, 59758796h 0x00000019 jmp 00007F41B1011B51h 0x0000001e popfd 0x0000001f movzx ecx, dx 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100B55 second address: 0000000005100B5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100B5A second address: 0000000005100B6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov si, bx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100B6B second address: 0000000005100B71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100B71 second address: 0000000005100B9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xchg eax, ebp 0x00000007 jmp 00007F41B1011B4Fh 0x0000000c mov ebp, esp 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F41B1011B50h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100B9D second address: 0000000005100BA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005150035 second address: 000000000515003B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000515003B second address: 000000000515003F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000515003F second address: 00000000051500A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007F41B1011B4Fh 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 call 00007F41B1011B54h 0x00000018 mov cx, A0F1h 0x0000001c pop eax 0x0000001d mov cx, bx 0x00000020 popad 0x00000021 pop ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 mov ax, A861h 0x00000029 pushfd 0x0000002a jmp 00007F41B1011B4Eh 0x0000002f add ax, 0AF8h 0x00000034 jmp 00007F41B1011B4Bh 0x00000039 popfd 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051500A2 second address: 00000000051500A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051500A8 second address: 00000000051500AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130B57 second address: 0000000005130B6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 4BFD6BA4h 0x00000008 push ebx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov bl, ch 0x00000013 movsx edi, ax 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130B6E second address: 0000000005130B74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130B74 second address: 0000000005130B78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130B78 second address: 0000000005130BA9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B51h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov edx, 03D1091Eh 0x00000015 jmp 00007F41B1011B4Fh 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130BA9 second address: 0000000005130BAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130BAF second address: 0000000005130BB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130BB3 second address: 0000000005130BB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130BB7 second address: 0000000005130BC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov si, di 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130BC7 second address: 0000000005130BCC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050D02B2 second address: 00000000050D0316 instructions: 0x00000000 rdtsc 0x00000002 call 00007F41B1011B53h 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push ebp 0x0000000c pushad 0x0000000d jmp 00007F41B1011B52h 0x00000012 pushfd 0x00000013 jmp 00007F41B1011B52h 0x00000018 and al, 00000018h 0x0000001b jmp 00007F41B1011B4Bh 0x00000020 popfd 0x00000021 popad 0x00000022 mov dword ptr [esp], ebp 0x00000025 pushad 0x00000026 mov edx, eax 0x00000028 mov esi, 64BFBCC7h 0x0000002d popad 0x0000002e mov ebp, esp 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050D0316 second address: 00000000050D031C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050D031C second address: 00000000050D0322 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000050D0322 second address: 00000000050D0326 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130453 second address: 0000000005130457 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130457 second address: 000000000513045B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000513045B second address: 0000000005130461 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130461 second address: 0000000005130476 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130476 second address: 000000000513047C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000513047C second address: 0000000005130482 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130482 second address: 0000000005130486 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130486 second address: 00000000051304D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F41B124424Dh 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 call 00007F41B124424Ch 0x00000016 pushfd 0x00000017 jmp 00007F41B1244252h 0x0000001c xor si, D448h 0x00000021 jmp 00007F41B124424Bh 0x00000026 popfd 0x00000027 pop eax 0x00000028 push eax 0x00000029 push edx 0x0000002a mov ebx, 3969DDEAh 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130AA0 second address: 0000000005130AA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 8FE2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130C68 second address: 0000000005130C85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244259h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130C85 second address: 0000000005130CDD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 call 00007F41B1011B4Dh 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jmp 00007F41B1011B58h 0x00000018 pushfd 0x00000019 jmp 00007F41B1011B52h 0x0000001e add cx, 3558h 0x00000023 jmp 00007F41B1011B4Bh 0x00000028 popfd 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051409B5 second address: 00000000051409B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051409B9 second address: 00000000051409BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051409BD second address: 00000000051409C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051409C3 second address: 00000000051409C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051409C9 second address: 00000000051409CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051409CD second address: 00000000051409EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F41B1011B56h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051409EE second address: 0000000005140A15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F41B1244255h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140A15 second address: 0000000005140A25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1011B4Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140A25 second address: 0000000005140A29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140A29 second address: 0000000005140A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140A39 second address: 0000000005140A3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140A3F second address: 0000000005140A51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1011B4Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140A51 second address: 0000000005140AE8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F41B1244258h 0x00000011 xor esi, 2C1C17E8h 0x00000017 jmp 00007F41B124424Bh 0x0000001c popfd 0x0000001d pushfd 0x0000001e jmp 00007F41B1244258h 0x00000023 add ax, AA48h 0x00000028 jmp 00007F41B124424Bh 0x0000002d popfd 0x0000002e popad 0x0000002f pushfd 0x00000030 jmp 00007F41B1244258h 0x00000035 add ah, FFFFFFA8h 0x00000038 jmp 00007F41B124424Bh 0x0000003d popfd 0x0000003e popad 0x0000003f mov dword ptr [esp], ecx 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 movsx ebx, cx 0x00000048 movzx ecx, bx 0x0000004b popad 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140AE8 second address: 0000000005140B33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edi 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [774365FCh] 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F41B1011B56h 0x00000015 pushfd 0x00000016 jmp 00007F41B1011B52h 0x0000001b add ax, 1498h 0x00000020 jmp 00007F41B1011B4Bh 0x00000025 popfd 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140B33 second address: 0000000005140B4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1244254h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140B4B second address: 0000000005140B69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a pushad 0x0000000b mov bl, 75h 0x0000000d mov ax, FBC5h 0x00000011 popad 0x00000012 je 00007F422328494Fh 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140B69 second address: 0000000005140B6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005140B6D second address: 0000000005140B73 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130ECD second address: 0000000005130F05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244259h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov cl, 5Bh 0x0000000d mov ecx, edi 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F41B1244251h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130F05 second address: 0000000005130F25 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 55C2h 0x00000007 mov al, dh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F41B1011B51h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005130F25 second address: 0000000005130F47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244251h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov ebx, 10164A1Eh 0x00000013 mov eax, edx 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100032 second address: 0000000005100078 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B54h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F41B1011B4Eh 0x00000011 sbb cx, 5988h 0x00000016 jmp 00007F41B1011B4Bh 0x0000001b popfd 0x0000001c movzx esi, di 0x0000001f popad 0x00000020 mov ebp, esp 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100078 second address: 000000000510007C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000510007C second address: 0000000005100082 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100082 second address: 0000000005100088 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100088 second address: 000000000510008C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000510008C second address: 0000000005100090 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100090 second address: 00000000051000B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and esp, FFFFFFF8h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F41B1011B58h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051000B5 second address: 00000000051000BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051000BB second address: 0000000005100123 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F41B1011B56h 0x0000000e mov dword ptr [esp], ecx 0x00000011 pushad 0x00000012 mov si, CEFDh 0x00000016 movzx esi, dx 0x00000019 popad 0x0000001a push esi 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007F41B1011B57h 0x00000024 or cx, 069Eh 0x00000029 jmp 00007F41B1011B59h 0x0000002e popfd 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100123 second address: 0000000005100128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100128 second address: 000000000510016A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 mov bh, EDh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebx 0x0000000e jmp 00007F41B1011B50h 0x00000013 mov ebx, dword ptr [ebp+10h] 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F41B1011B4Dh 0x0000001f jmp 00007F41B1011B4Bh 0x00000024 popfd 0x00000025 mov dx, ax 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000510016A second address: 000000000510017E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41B1244250h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000510017E second address: 00000000051001F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007F41B1011B56h 0x00000011 push eax 0x00000012 jmp 00007F41B1011B4Bh 0x00000017 xchg eax, esi 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b call 00007F41B1011B4Bh 0x00000020 pop eax 0x00000021 pushfd 0x00000022 jmp 00007F41B1011B59h 0x00000027 add ah, 00000006h 0x0000002a jmp 00007F41B1011B51h 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051001F2 second address: 0000000005100263 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244251h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+08h] 0x0000000c jmp 00007F41B124424Eh 0x00000011 xchg eax, edi 0x00000012 pushad 0x00000013 mov dh, ch 0x00000015 mov edi, 2144F0EEh 0x0000001a popad 0x0000001b push eax 0x0000001c jmp 00007F41B1244254h 0x00000021 xchg eax, edi 0x00000022 jmp 00007F41B1244250h 0x00000027 test esi, esi 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F41B1244257h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100263 second address: 0000000005100269 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100269 second address: 0000000005100285 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F42234F25E1h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100285 second address: 000000000510028D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ax, bx 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000510028D second address: 0000000005100293 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100293 second address: 0000000005100322 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B54h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [esi+08h], DDEEDDEEh 0x00000012 jmp 00007F41B1011B50h 0x00000017 je 00007F42232BFEADh 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007F41B1011B4Dh 0x00000024 sbb ecx, 3378FBF6h 0x0000002a jmp 00007F41B1011B51h 0x0000002f popfd 0x00000030 popad 0x00000031 mov edx, dword ptr [esi+44h] 0x00000034 pushad 0x00000035 mov bh, 8Ch 0x00000037 popad 0x00000038 or edx, dword ptr [ebp+0Ch] 0x0000003b jmp 00007F41B1011B52h 0x00000040 test edx, 61000000h 0x00000046 push eax 0x00000047 push edx 0x00000048 push eax 0x00000049 push edx 0x0000004a jmp 00007F41B1011B4Ah 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100322 second address: 0000000005100328 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100328 second address: 0000000005100349 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F41B1011B4Ch 0x00000009 add ah, FFFFFFA8h 0x0000000c jmp 00007F41B1011B4Bh 0x00000011 popfd 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005100349 second address: 000000000510038A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jne 00007F42234F257Eh 0x0000000d jmp 00007F41B1244254h 0x00000012 test byte ptr [esi+48h], 00000001h 0x00000016 jmp 00007F41B1244250h 0x0000001b jne 00007F42234F2569h 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000510038A second address: 000000000510038E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000510038E second address: 0000000005100394 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511005E second address: 00000000051100FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F41B1011B57h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e pushad 0x0000000f mov ah, 49h 0x00000011 call 00007F41B1011B57h 0x00000016 mov eax, 71DC891Fh 0x0000001b pop ecx 0x0000001c popad 0x0000001d push eax 0x0000001e pushad 0x0000001f call 00007F41B1011B50h 0x00000024 pushfd 0x00000025 jmp 00007F41B1011B52h 0x0000002a sub ax, 05B8h 0x0000002f jmp 00007F41B1011B4Bh 0x00000034 popfd 0x00000035 pop ecx 0x00000036 mov ebx, 1D5B5CFCh 0x0000003b popad 0x0000003c xchg eax, ebx 0x0000003d jmp 00007F41B1011B4Bh 0x00000042 xchg eax, esi 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007F41B1011B50h 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051100FD second address: 0000000005110101 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110101 second address: 0000000005110107 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110107 second address: 0000000005110124 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F41B124424Ch 0x00000008 pop eax 0x00000009 mov si, dx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110124 second address: 000000000511012A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511012A second address: 0000000005110130 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110130 second address: 0000000005110134 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110134 second address: 000000000511014B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B124424Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511014B second address: 000000000511014F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511014F second address: 0000000005110155 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110155 second address: 0000000005110189 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, bx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+08h] 0x0000000c jmp 00007F41B1011B58h 0x00000011 sub ebx, ebx 0x00000013 pushad 0x00000014 mov esi, edi 0x00000016 movsx ebx, ax 0x00000019 popad 0x0000001a test esi, esi 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f mov al, 20h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110189 second address: 0000000005110235 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F41B1244253h 0x00000008 sbb ax, 1A5Eh 0x0000000d jmp 00007F41B1244259h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov esi, 06176B27h 0x0000001a popad 0x0000001b je 00007F42234DA40Eh 0x00000021 pushad 0x00000022 mov dx, ax 0x00000025 call 00007F41B1244254h 0x0000002a mov cx, D321h 0x0000002e pop ecx 0x0000002f popad 0x00000030 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000037 pushad 0x00000038 movsx edi, ax 0x0000003b mov esi, 40E64F1Bh 0x00000040 popad 0x00000041 mov ecx, esi 0x00000043 jmp 00007F41B124424Eh 0x00000048 je 00007F42234DA3DEh 0x0000004e pushad 0x0000004f push ecx 0x00000050 jmp 00007F41B124424Dh 0x00000055 pop eax 0x00000056 mov cx, dx 0x00000059 popad 0x0000005a test byte ptr [77436968h], 00000002h 0x00000061 push eax 0x00000062 push edx 0x00000063 pushad 0x00000064 mov ebx, eax 0x00000066 mov di, cx 0x00000069 popad 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110235 second address: 0000000005110252 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F42232A7CB6h 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 movzx esi, dx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110252 second address: 000000000511025D instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 mov edx, eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511025D second address: 000000000511026D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov edx, dword ptr [ebp+0Ch] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511026D second address: 0000000005110271 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110271 second address: 0000000005110277 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110277 second address: 000000000511027D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511027D second address: 0000000005110281 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110281 second address: 00000000051102C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1244254h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c jmp 00007F41B1244250h 0x00000011 push eax 0x00000012 pushad 0x00000013 call 00007F41B1244251h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051102C1 second address: 0000000005110333 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 mov dl, 94h 0x00000007 popad 0x00000008 xchg eax, ebx 0x00000009 jmp 00007F41B1011B56h 0x0000000e xchg eax, ebx 0x0000000f pushad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 pushfd 0x00000014 jmp 00007F41B1011B4Ah 0x00000019 xor eax, 337EDE28h 0x0000001f jmp 00007F41B1011B4Bh 0x00000024 popfd 0x00000025 popad 0x00000026 mov bl, al 0x00000028 popad 0x00000029 push eax 0x0000002a jmp 00007F41B1011B52h 0x0000002f xchg eax, ebx 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F41B1011B57h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110333 second address: 0000000005110356 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, edx 0x00000005 mov edi, 645147A6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push dword ptr [ebp+14h] 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F41B124424Fh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110356 second address: 000000000511035A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 000000000511035A second address: 0000000005110360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110360 second address: 0000000005110369 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 5FE1h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 0000000005110395 second address: 00000000051103E8 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F41B1244256h 0x00000008 and cx, 3A08h 0x0000000d jmp 00007F41B124424Bh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov ebx, ecx 0x00000017 popad 0x00000018 pop ebx 0x00000019 pushad 0x0000001a mov esi, 2902E877h 0x0000001f jmp 00007F41B124424Ch 0x00000024 popad 0x00000025 mov esp, ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F41B124424Ah 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051103E8 second address: 00000000051103F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41B1011B4Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051103F7 second address: 00000000051103FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jk98mGM6JH.exe | RDTSC instruction interceptor: First address: 00000000051103FD second address: 0000000005110401 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |