Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h | 3_2_0044B050 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov dl, 01h | 3_2_00416016 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movsx edx, byte ptr [ebp+ebx+00h] | 3_2_0044A020 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov ebp, eax | 3_2_0044A020 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+28h] | 3_2_004340F2 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esp+04h] | 3_2_004240A0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] | 3_2_0041513F |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h | 3_2_0044B1E0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esp+0Ch] | 3_2_00423190 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh | 3_2_00445230 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx ebx, byte ptr [ecx+edi] | 3_2_00445230 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah | 3_2_0044B360 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov esi, dword ptr [esp+14h] | 3_2_0040131C |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx eax, word ptr [esi+ecx] | 3_2_004423D0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 77A9E0C4h | 3_2_004404F0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] | 3_2_00413545 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov word ptr [edx], ax | 3_2_00428556 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx ebx, word ptr [ecx] | 3_2_00428556 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov ebp, eax | 3_2_0044A570 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then push 00000000h | 3_2_004035F0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] | 3_2_0041562A |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh | 3_2_00449630 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+000001B8h] | 3_2_00431750 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+00000744h] | 3_2_00431750 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov byte ptr [edi], al | 3_2_00431750 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], CECD21FDh | 3_2_0042B720 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh | 3_2_0042B720 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 3_2_0042D720 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 3_2_004207C0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esp+000004B0h] | 3_2_0041D792 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi] | 3_2_0041D792 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx edx, byte ptr [ebp+ebx+00h] | 3_2_00404870 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [ebx+ecx*8], C766965Ch | 3_2_004448D0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esp+14h] | 3_2_0040D970 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then dec ebx | 3_2_0043F920 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx edx, byte ptr [esi+edi] | 3_2_00404A60 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov dword ptr [esp], 00000000h | 3_2_0041AA70 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 3_2_0042FAC0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 3_2_0042DAE0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 3_2_0043BB50 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx edx, byte ptr [esi+ebx] | 3_2_00405B70 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh | 3_2_00444B10 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 3_2_0042BB20 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh | 3_2_00426BDA |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 54CA534Eh | 3_2_00448BA0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [ebp-000000CCh] | 3_2_0042ABBC |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh | 3_2_00445C60 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movzx edi, word ptr [eax] | 3_2_00449C70 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movsx edx, byte ptr [ebp+ebx+00h] | 3_2_00449C70 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov ebp, eax | 3_2_00449C70 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov word ptr [eax], dx | 3_2_00420CE9 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h | 3_2_00425D20 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+64h] | 3_2_00432DD3 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov ecx, ebx | 3_2_00408D90 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then push edi | 3_2_00427E73 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then push edi | 3_2_00427E73 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then movsx edx, byte ptr [ebp+ebx+00h] | 3_2_00449E90 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov ebp, eax | 3_2_00449E90 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] | 3_2_00413F7E |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov ebx, ecx | 3_2_00413F7E |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esp+04h] | 3_2_00411F33 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov word ptr [eax], cx | 3_2_00425F80 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov byte ptr [edi], al | 3_2_00433FA1 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov eax, dword ptr [esi+00000744h] | 3_2_00433FB6 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov byte ptr [edi], al | 3_2_00433FB6 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov byte ptr [edi], al | 3_2_00433FB6 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then mov edi, eax | 3_2_0042CFBC |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 4x nop then jmp eax | 3_2_0042CFBC |
Source: global traffic | HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=KGDWMUGzXSzGHLb&MD=tbZlVl+h HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic | HTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com |
Source: global traffic | HTTP traffic detected: GET /1KhnJ4 HTTP/1.1Host: iplogger.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /1KhnJ4 HTTP/1.1Host: iplogger.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8ccd8274b9e442c9 HTTP/1.1Host: iplogger.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://iplogger.com/1KhnJ4?__cf_chl_rt_tk=uzgDrbo7G9tR40KRb5FXyZ9uJF.2cqXfIjT9C.Swxlo-1727964562-0.0.1.1-5246Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /turnstile/v0/g/ec4b873d446c/api.js?onload=Jeuhg1&render=explicit HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://iplogger.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8ccd8274b9e442c9 HTTP/1.1Host: iplogger.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: iplogger.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://iplogger.com/1KhnJ4Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /turnstile/v0/g/ec4b873d446c/api.js?onload=Jeuhg1&render=explicit HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/ha9g5/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/flow/ov1/1787772256:1727962003:iWCRLIu4ZygN5hNL9RXktFOgCDxm7GLFIz5ri-9QP5c/8ccd8274b9e442c9/79895931bf779a4 HTTP/1.1Host: iplogger.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: iplogger.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8ccd8289bc184228&lang=auto HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/ha9g5/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/ha9g5/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8ccd8289bc184228&lang=auto HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/flow/ov1/1300389161:1727962023:QSoqQkjz0PpYr1szVnKI7X7Fbyyo_-jod5ykE5mZtpI/8ccd8289bc184228/6e64b4d206e3507 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/pat/8ccd8289bc184228/1727964569365/186f8d6e14d4fe0eb3804fd1be46d1535ddfe35c7ad2d6cb8e9dce82775fb104/hz5T_VEh25F25lZ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveCache-Control: max-age=0sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/ha9g5/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/i/8ccd8289bc184228/1727964569367/0T9ApzVXXVphPFj HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/ha9g5/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/i/8ccd8289bc184228/1727964569367/0T9ApzVXXVphPFj HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /cdn-cgi/challenge-platform/h/g/flow/ov1/1300389161:1727962023:QSoqQkjz0PpYr1szVnKI7X7Fbyyo_-jod5ykE5mZtpI/8ccd8289bc184228/6e64b4d206e3507 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic | HTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=KGDWMUGzXSzGHLb&MD=tbZlVl+h HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: DWrite.dll | String found in binary or memory: http://.css |
Source: DWrite.dll | String found in binary or memory: http://.jpg |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: dxcompiler.dll | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: dxcompiler.dll | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: DragExt64.dll | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0= |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://earth.google.com/kml/2.0 |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://earth.google.com/kml/2.1 |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://earth.google.com/kml/2.2 |
Source: DWrite.dll | String found in binary or memory: http://html4/loose.dtd |
Source: dxcompiler.dll | String found in binary or memory: http://khr.io/hlsl2spirv#optimization) |
Source: dxcompiler.dll | String found in binary or memory: http://khr.io/hlsl2spirv#optimization)OdumpPrint |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://ocsp.digicert.com0 |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://ocsp.digicert.com0A |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://ocsp.digicert.com0C |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://ocsp.digicert.com0X |
Source: n3.exe, 00000002.00000002.2283088348.0000000001206000.00000008.00000001.01000000.00000009.sdmp, n3.exe, 00000002.00000000.2127075453.0000000001206000.00000008.00000001.01000000.00000009.sdmp, n3.exe.0.dr | String found in binary or memory: http://scripts.sil.org/OFL |
Source: n3.exe.0.dr | String found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311833128.0000000002B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311833128.0000000002B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311833128.0000000002B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: n3.exe, 00000002.00000002.2283088348.0000000001206000.00000008.00000001.01000000.00000009.sdmp, n3.exe, 00000002.00000000.2127075453.0000000001206000.00000008.00000001.01000000.00000009.sdmp, n3.exe.0.dr | String found in binary or memory: http://www.ascendercorp.com/ |
Source: n3.exe.0.dr | String found in binary or memory: http://www.ascendercorp.com/http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.ht |
Source: n3.exe, 00000002.00000002.2283088348.0000000001206000.00000008.00000001.01000000.00000009.sdmp, n3.exe, 00000002.00000000.2127075453.0000000001206000.00000008.00000001.01000000.00000009.sdmp, n3.exe.0.dr | String found in binary or memory: http://www.ascendercorp.com/typedesigners.html |
Source: n3.exe, 00000002.00000002.2284662032.0000000002484000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.collada.org/2005/11/COLLADASchema |
Source: DragExt64.dll, dxcompiler.dll | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: n3.exe, 00000002.00000002.2284662032.0000000002502000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2 |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.opengis.net/gml |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.opengis.net/gml/3.2 |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.opengis.net/gml/3.3/exr |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.opengis.net/kml/2.2 |
Source: n3.exe, 00000002.00000002.2284662032.0000000002490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.topografix.com/GPX/1/1 |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://advocachark.store/ |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://advocachark.store/R |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://advocachark.store/api |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://advocachark.store/api9 |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://advocachark.store:443/apipp |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.akamai.steamstaticHJ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/attachments/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/avatars/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/banners/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/channel-icons/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/guilds/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/icons/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/role-icons/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://cdn.discordapp.com/splashes/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG& |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1 |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311833128.0000000002B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=2ZRoxzol |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=fWwP |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=HeLxjRDbQrcV&l=e |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english |
Source: BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6& |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1& |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv |
Source: BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0 |
Source: n3.exe | String found in binary or memory: https://datalake.azure.net/https://api.loganalytics.iohttps://graph.microsoft.us/https://api.loganal |
Source: n3.exe | String found in binary or memory: https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall |
Source: n3.exe, 00000002.00000002.2285591123.000000000282A000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9//sticker-packs |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9//voice/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9//voice/regions |
Source: n3.exe, 00000002.00000002.2285591123.000000000282A000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/09Az~~go_sched_gomaxprocs_threadsgo_memstats_alloc_bytes_totalgo_memstats |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/applications |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/channels/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/gateway |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/gateway/bot |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/guilds |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/guilds/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/oauth2/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/oauth2/applications |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/stage-instances |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/stickers/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/users/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002868000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/v9/webhooks/ |
Source: n3.exe | String found in binary or memory: https://github.com/golang/protobuf/issues/1609): |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: Activator by URKE v2.5.exe, 00000000.00000003.2297946552.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp, uros.url.0.dr | String found in binary or memory: https://iplogger.com/1KhnJ4 |
Source: Activator by URKE v2.5.exe, 00000000.00000003.2314678126.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp, Activator by URKE v2.5.exe, 00000000.00000003.2315704743.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp, Activator by URKE v2.5.exe, 00000000.00000002.2317043498.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp, Activator by URKE v2.5.exe, 00000000.00000003.2297946552.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://iplogger.com/1KhnJ4& |
Source: Activator by URKE v2.5.exe, 00000000.00000003.2300449931.00000267D8021000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://iplogger.com/1KhnJ4( |
Source: Activator by URKE v2.5.exe, 00000000.00000003.2314678126.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp, Activator by URKE v2.5.exe, 00000000.00000003.2315704743.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp, Activator by URKE v2.5.exe, 00000000.00000002.2317043498.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp, Activator by URKE v2.5.exe, 00000000.00000003.2297946552.00000267D7F98000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://iplogger.com/1KhnJ4. |
Source: Activator by URKE v2.5.exe, 00000000.00000003.2300449931.00000267D8021000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://iplogger.com/1KhnJ4rr |
Source: dxcompiler.dll | String found in binary or memory: https://llvm.org/svn/llvm-project/cfe/tags/RELEASE_370/final/lib/Basic/Version.cpp |
Source: n3.exe | String found in binary or memory: https://login.microsoftonline.com/https://gallery.usgovcloudapi.net/mariadb.database.usgovcloudapi.n |
Source: n3.exe | String found in binary or memory: https://manage.windowsazure.com/https://vault.usgovcloudapi.net/mysql.database.usgovcloudapi.nethttp |
Source: n3.exe | String found in binary or memory: https://management.core.windows.net/https://management.chinacloudapi.cn/https://servicebus.chinaclou |
Source: n3.exe | String found in binary or memory: https://management.usgovcloudapi.net/https://servicebus.usgovcloudapi.net/https://batch.core.usgovcl |
Source: n3.exe | String found in binary or memory: https://servicebus.windows.net/https://batch.core.windows.net/https://manage.windowsazure.us/https:/ |
Source: n3.exe, 00000002.00000002.2285591123.00000000027DC000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/ |
Source: n3.exe, 00000002.00000002.2285591123.0000000002664000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/active.json |
Source: n3.exe, 00000002.00000002.2285591123.0000000002664000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v |
Source: n3.exe, 00000002.00000002.2285591123.0000000002664000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json |
Source: BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311833128.0000000002B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: BitLockerToGo.exe, 00000003.00000002.2311503934.0000000002A7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/765 |
Source: BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AAD000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AAD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311833128.0000000002B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308878009.0000000002AAD000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311588776.0000000002AAD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900:kA |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000003.00000002.2311833128.0000000002B1F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: n3.exe | String found in binary or memory: https://vault.azure.net/mysql.database.azure.comhttps://cosmos.azure.comtoken |
Source: n3.exe | String found in binary or memory: https://vault.azure.netusgovtrafficmanager.netvault.usgovcloudapi.nethttps://vault.azure.cn/vault.mi |
Source: DragExt64.dll | String found in binary or memory: https://winscp.net/D |
Source: DragExt64.dll | String found in binary or memory: https://winscp.net/eng/docs/dragext |
Source: BitLockerToGo.exe, 00000003.00000003.2308783987.0000000002B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: unknown | Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49733 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49742 |
Source: unknown | Network traffic detected: HTTP traffic on port 49672 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49741 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown | Network traffic detected: HTTP traffic on port 49727 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49746 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown | Network traffic detected: HTTP traffic on port 49717 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49759 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49735 |
Source: unknown | Network traffic detected: HTTP traffic on port 49753 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49734 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49733 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49698 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49731 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49724 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49742 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49749 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49729 |
Source: unknown | Network traffic detected: HTTP traffic on port 49752 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | Network traffic detected: HTTP traffic on port 49714 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49727 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49726 |
Source: unknown | Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49725 |
Source: unknown | Network traffic detected: HTTP traffic on port 49735 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49724 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49723 |
Source: unknown | Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49722 |
Source: unknown | Network traffic detected: HTTP traffic on port 49674 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 49758 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49731 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49761 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49760 |
Source: unknown | Network traffic detected: HTTP traffic on port 49725 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49741 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49729 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49748 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49760 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown | Network traffic detected: HTTP traffic on port 49751 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49717 |
Source: unknown | Network traffic detected: HTTP traffic on port 49715 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49716 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49715 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49759 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49714 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49758 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49757 |
Source: unknown | Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49755 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49698 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49755 |
Source: unknown | Network traffic detected: HTTP traffic on port 49757 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49734 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49754 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49753 |
Source: unknown | Network traffic detected: HTTP traffic on port 49673 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49752 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49751 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49750 |
Source: unknown | Network traffic detected: HTTP traffic on port 49726 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49761 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49747 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | Network traffic detected: HTTP traffic on port 49716 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49750 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49749 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49748 |
Source: unknown | Network traffic detected: HTTP traffic on port 49754 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49747 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49746 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F0569C | 0_2_00007FF7E5F0569C |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F1400C | 0_2_00007FF7E5F1400C |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5EFA8AC | 0_2_00007FF7E5EFA8AC |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F06294 | 0_2_00007FF7E5F06294 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F0ECE0 | 0_2_00007FF7E5F0ECE0 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F109D8 | 0_2_00007FF7E5F109D8 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5EFDC4C | 0_2_00007FF7E5EFDC4C |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5EFBF0C | 0_2_00007FF7E5EFBF0C |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F22F24 | 0_2_00007FF7E5F22F24 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F29008 | 0_2_00007FF7E5F29008 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F1C074 | 0_2_00007FF7E5F1C074 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F1FD18 | 0_2_00007FF7E5F1FD18 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F1BDF8 | 0_2_00007FF7E5F1BDF8 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5EF72AC | 0_2_00007FF7E5EF72AC |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5EFB948 | 0_2_00007FF7E5EFB948 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F25510 | 0_2_00007FF7E5F25510 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5EFE91C | 0_2_00007FF7E5EFE91C |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F1400C | 0_2_00007FF7E5F1400C |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F259E0 | 0_2_00007FF7E5F259E0 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5F0CA30 | 0_2_00007FF7E5F0CA30 |
Source: C:\Users\user\Desktop\Activator by URKE v2.5.exe | Code function: 0_2_00007FF7E5EFB318 | 0_2_00007FF7E5EFB318 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004101F0 | 3_2_004101F0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040FBA0 | 3_2_0040FBA0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00401000 | 3_2_00401000 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040B010 | 3_2_0040B010 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00407010 | 3_2_00407010 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0044A020 | 3_2_0044A020 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004110F0 | 3_2_004110F0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0044814A | 3_2_0044814A |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00449150 | 3_2_00449150 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0043F180 | 3_2_0043F180 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00405250 | 3_2_00405250 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00445230 | 3_2_00445230 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00427350 | 3_2_00427350 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040135B | 3_2_0040135B |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040131C | 3_2_0040131C |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0042B325 | 3_2_0042B325 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0044033D | 3_2_0044033D |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004073E0 | 3_2_004073E0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004104CA | 3_2_004104CA |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040B4A0 | 3_2_0040B4A0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040A4A0 | 3_2_0040A4A0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00428556 | 3_2_00428556 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0044A570 | 3_2_0044A570 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004095EA | 3_2_004095EA |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004035F0 | 3_2_004035F0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00449630 | 3_2_00449630 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0044B750 | 3_2_0044B750 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004087C0 | 3_2_004087C0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004337C2 | 3_2_004337C2 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0041D792 | 3_2_0041D792 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004368D0 | 3_2_004368D0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_004108F7 | 3_2_004108F7 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040A960 | 3_2_0040A960 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00410920 | 3_2_00410920 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00438990 | 3_2_00438990 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0044BA20 | 3_2_0044BA20 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0042BB40 | 3_2_0042BB40 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0042BB20 | 3_2_0042BB20 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00426BDA | 3_2_00426BDA |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0042ABBC | 3_2_0042ABBC |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00449C70 | 3_2_00449C70 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040CCD0 | 3_2_0040CCD0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00432DD3 | 3_2_00432DD3 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00407E20 | 3_2_00407E20 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_00449E90 | 3_2_00449E90 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0040BFB0 | 3_2_0040BFB0 |
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | Code function: 3_2_0042CFBC | 3_2_0042CFBC |