Source: Offnewhere.exe, 00000015.00000000.2796258598.00000000008F9000.00000002.00000001.01000000.00000014.sdmp, 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: http://.css |
Source: Offnewhere.exe, 00000015.00000000.2796258598.00000000008F9000.00000002.00000001.01000000.00000014.sdmp, 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: http://.jpg |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://103.130.147.211/Files/1.exe0 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://103.130.147.211/Files/1.exe: |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000014.00000002.3018621240.000000000082C000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000014.00000002.3012882720.000000000078D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/ |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/15.113.16/216e50adc2dd0a1bfe522b3effbbd4e64e3aa636b77## |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/15.113.16/ta |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/216e50adc2dd0a1bfe522b3effbbd4e64e3aa636b77 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Downloads |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000007.00000002.4561179734.0000000001101000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000007.00000002.4561179734.000000000105B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php&O |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php2O |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php9 |
Source: axplong.exe, 00000007.00000002.4561179734.0000000001101000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php9001 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpCOMJN |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpFN |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpNO |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpRN |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpVO |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpded8 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncoded |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncodedD |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncodedi |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncodedu |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php~O |
Source: InstallUtil.exe, 00000014.00000002.3018621240.000000000082C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/K |
Source: InstallUtil.exe, 00000014.00000002.3018621240.000000000082C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/S |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/ViewSizePreferences.SourceAumid1 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/dobre/random.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/dobre/random.exe5 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/dobre/splwow64.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/12.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/gold.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/gold.exeh |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/myrdx.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/myrdx.exef |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/stealc_default2.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000101B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000007.00000002.4561179734.000000000106F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/zxcv.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000106F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/zxcv.exe3 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000106F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/zxcv.exef69c5867ee82 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/luma/random.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/lumma/random.exe |
Source: InstallUtil.exe, 00000014.00000002.3013913479.00000000007BE000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000014.00000002.3012882720.000000000077C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/ons |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/steam/random.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/steam/random.exe6 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/ta |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.00000000007EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17 |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 0000000E.00000002.2886105690.00000000007EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/ |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 0000000E.00000002.2886105690.000000000081E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php.dll |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php3 |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpch |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.000000000084E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpinomi |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.000000000084E000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpl |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.000000000084E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpla |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpos |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpp1#Ivx |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpt |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000E6B000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phption: |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.000000000084E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpwser |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/9 |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/freebl3.dll |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/freebl3.dllY |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/mozglue.dll |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/mozglue.dllG |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/msvcp140.dll |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/msvcp140.dllk |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.000000000081E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/nss3.dll |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.000000000081E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/nss3.dllDt |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dll |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/sqlite3.dll |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dll= |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000832000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dllN |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000E6B000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: http://185.215.113.172fb6c2cc8dce150a.phption: |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.00000000011CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206 |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001216000.00000004.00000020.00020000.00000000.sdmp, 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp, 4ad48d7d65.exe, 0000002B.00000002.3186818225.00000000011CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/ |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.00000000011CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/e2b1563c6670f193.php |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/e2b1563c6670f193.php/ |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/e2b1563c6670f193.php/) |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/e2b1563c6670f193.php9 |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/e2b1563c6670f193.phpI |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/e2b1563c6670f193.phpU |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/e2b1563c6670f193.phpq |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/v |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001227000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/ws |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.00000000011CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206; |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Offnewhere.exe |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Offnewhere.exe_ |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0 |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: splwow64.exe, 0000001C.00000002.2991915904.000000000041F000.00000004.00000001.01000000.0000001C.sdmp, splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://crl.globalsign.net/root-r3.crl0 |
Source: InstallUtil.exe, 00000014.00000002.3014718107.0000000000809000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: splwow64.exe.7.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd |
Source: Offnewhere.exe, 00000015.00000000.2796258598.00000000008F9000.00000002.00000001.01000000.00000014.sdmp | String found in binary or memory: http://home.sevtji17ht.top/pYdgAbRKumVXpoeGtZwN19 |
Source: 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: http://home.tventji20vs.top/NWYJPzCYEvZpxoyKvBIK92 |
Source: Offnewhere.exe, 00000015.00000000.2796258598.00000000008F9000.00000002.00000001.01000000.00000014.sdmp, 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: splwow64.exe, 0000001C.00000002.2991870621.0000000000408000.00000002.00000001.01000000.0000001C.sdmp, splwow64.exe, 0000001C.00000000.2918578471.0000000000408000.00000002.00000001.01000000.0000001C.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20 |
Source: splwow64.exe, 0000001C.00000002.2991915904.000000000041F000.00000004.00000001.01000000.0000001C.sdmp, splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns |
Source: gold.exe, 00000013.00000002.2774776253.0000000003886000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty0Xu |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/ |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/D |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id1 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id10 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id10Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002B82000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id10ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id11 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id11Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id11ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id12 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id12Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id12ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id13 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id13Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id13ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id14 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id14Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id14ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15V |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id16 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id16Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id16ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id17 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id17Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id17ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id18 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id18Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id18ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id19 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id19Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id19ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id1Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id1ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id2 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id20 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id20Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002AF2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id20ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id21 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id21Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id21ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id22 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id22Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002B82000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id22ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id23 |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id23Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002B82000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id23ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id24 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id24Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id2Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id2ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id3 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id3Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id4 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id4Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id4ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id5 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id5Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id5ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id6 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id6Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002AE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id6ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id7 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id7Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id7ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002AF2000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id8 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id8Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002AF2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id8ResponseD |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id9 |
Source: MSBuild.exe, 00000017.00000002.3053254646.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id9Response |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002A86000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id9ResponseD |
Source: Amcache.hve.13.dr | String found in binary or memory: http://upx.sf.net |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000000.3014711658.0000000000539000.00000002.00000001.01000000.00000022.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010F9000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe.7.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: stealc_default2.exe, stealc_default2.exe, 0000000E.00000002.2920107247.000000006BB1D000.00000002.00000001.01000000.00000017.sdmp | String found in binary or memory: http://www.mozilla.com/en-US/blocklist/ |
Source: stealc_default2.exe, 0000000E.00000002.2919401771.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp, stealc_default2.exe, 0000000E.00000002.2904779763.000000001AEFE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.sqlite.org/copyright.html. |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: d0d468f327.exe, 00000024.00000003.3212968821.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: Offnewhere.exe, 00000015.00000000.2796258598.00000000008F9000.00000002.00000001.01000000.00000014.sdmp, 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: https://ace-snapper-privately.ngrok-free.app/test/test |
Source: Offnewhere.exe, 00000015.00000000.2796258598.00000000008F9000.00000002.00000001.01000000.00000014.sdmp, 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: https://ace-snapper-privately.ngrok-free.app/test/testFailed |
Source: myrdx.exe, 00000016.00000002.2910389172.00000000002AC000.00000004.00000001.01000000.00000015.sdmp, MSBuild.exe, 00000017.00000002.3053254646.0000000002A49000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000017.00000002.3026057510.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/ip |
Source: stealc_default2.exe, 0000000E.00000002.2910843085.0000000027030000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3223445453.0000000005BFB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: stealc_default2.exe, 0000000E.00000002.2910843085.0000000027030000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000861000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000861000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: stealc_default2.exe, 0000000E.00000002.2910843085.0000000027030000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: stealc_default2.exe, 0000000E.00000002.2910843085.0000000027030000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3223445453.0000000005BFB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: InstallUtil.exe, 00000014.00000002.3014718107.0000000000809000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crisiwarny.store/ |
Source: InstallUtil.exe, 00000014.00000002.3014718107.0000000000809000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crisiwarny.store/N |
Source: InstallUtil.exe, 00000014.00000002.3014718107.0000000000809000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crisiwarny.store/Y |
Source: InstallUtil.exe, 00000014.00000002.3014718107.0000000000809000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crisiwarny.store/an |
Source: InstallUtil.exe, 00000014.00000002.3035380844.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000014.00000002.3018621240.000000000082C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crisiwarny.store/api |
Source: InstallUtil.exe, 00000014.00000002.3035380844.0000000002D30000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://crisiwarny.store/apiVi |
Source: 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: Offnewhere.exe, 00000015.00000000.2796258598.00000000008F9000.00000002.00000001.01000000.00000014.sdmp, 1.exe, 0000001B.00000000.2881014480.0000000000F04000.00000002.00000001.01000000.0000001B.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000861000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000861000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: gold.exe, 00000013.00000002.2806606580.0000000004788000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2806606580.0000000004595000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2817662633.0000000005D60000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: gold.exe, 00000013.00000002.2806606580.0000000004788000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2806606580.0000000004595000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2817662633.0000000005D60000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: gold.exe, 00000013.00000002.2806606580.0000000004788000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2806606580.0000000004595000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2817662633.0000000005D60000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: stealc_default2.exe, 0000000E.00000002.2910843085.0000000027030000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3223445453.0000000005BFB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: d0d468f327.exe, 00000024.00000003.3241594886.000000000139E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/ |
Source: d0d468f327.exe, 00000024.00000003.3860072459.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860181129.0000000001373000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859935758.000000000136E000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3869148594.0000000001374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/T1 |
Source: d0d468f327.exe, 00000024.00000003.3518169431.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860072459.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860181129.0000000001373000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859935758.000000000136E000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3869148594.0000000001374000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3742129280.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3843451594.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/_1 |
Source: d0d468f327.exe, 00000024.00000003.3860117485.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3518169431.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859535207.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3869185371.000000000137D000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3792596827.000000000137D000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860072459.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860181129.0000000001373000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3115117345.000000000137B000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859935758.000000000136E000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3868990763.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3869148594.0000000001374000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3843451594.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859535207.00000000012E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/api |
Source: d0d468f327.exe, 00000024.00000003.3860117485.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859535207.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3868990763.0000000001314000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/apip-Y7 |
Source: d0d468f327.exe, 00000024.00000003.3518169431.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/apir2 |
Source: d0d468f327.exe, 00000024.00000003.3860072459.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860181129.0000000001373000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859935758.000000000136E000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3869148594.0000000001374000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3843451594.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/apis2 |
Source: d0d468f327.exe, 00000024.00000003.3426127285.0000000001384000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3435924479.0000000001390000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3212872917.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3241887546.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3302300126.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3771730592.000000000138C000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3274758029.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3330816935.0000000001383000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3836606968.0000000001392000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3330670556.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3270101653.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3242119222.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3268957101.0000000001382000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3869329802.0000000001392000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3685785442.0000000001392000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3435730777.000000000138C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/d |
Source: d0d468f327.exe, 00000024.00000003.3212774952.000000000139D000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3181850438.00000000013A0000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3165998045.000000000139F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/e |
Source: d0d468f327.exe, 00000024.00000003.3860072459.0000000001370000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860181129.0000000001373000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859935758.000000000136E000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3869148594.0000000001374000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store/s1 |
Source: d0d468f327.exe, 00000024.00000003.3860117485.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859535207.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3868990763.0000000001314000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store:443/api |
Source: d0d468f327.exe, 00000024.00000003.3212872917.000000000137B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store:443/api/Mailbird |
Source: d0d468f327.exe, 00000024.00000003.3860117485.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859535207.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3868990763.0000000001314000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://opinieni.store:443/api0 |
Source: axplong.exe, 00000007.00000002.4561179734.00000000010C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sectigo.com/CPS0 |
Source: gold.exe, 00000013.00000002.2806606580.0000000004788000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2806606580.0000000004595000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2817662633.0000000005D60000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: gold.exe, 00000013.00000002.2806606580.0000000004788000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2774776253.0000000003571000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2806606580.0000000004595000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2817662633.0000000005D60000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: gold.exe, 00000013.00000002.2806606580.0000000004788000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2806606580.0000000004595000.00000004.00000800.00020000.00000000.sdmp, gold.exe, 00000013.00000002.2817662633.0000000005D60000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: stealc_default2.exe, 0000000E.00000003.2839188523.000000002D131000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL |
Source: stealc_default2.exe, 0000000E.00000002.2910843085.0000000027030000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: stealc_default2.exe, 0000000E.00000002.2910843085.0000000027030000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3223445453.0000000005BFB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.0000000000861000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: Jurisdiction.pif.29.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: splwow64.exe, 0000001C.00000003.2937746757.0000000002921000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000029.00000003.3044061111.0000000003C3C000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif.29.dr | String found in binary or memory: https://www.globalsign.com/repository/06 |
Source: d0d468f327.exe, 00000024.00000003.3132758614.0000000005B96000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000CFA000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: https://www.mozilla.org/about/ |
Source: d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000CFA000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/ |
Source: d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6 |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000CFA000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ |
Source: stealc_default2.exe, 0000000E.00000003.2839188523.000000002D131000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000CFA000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ZoZ2ZuaGJncGpkZW5qZ21kZ29laWFwcGFmbG58MXwwfDB8SmF4eCBM |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000CFA000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/lvYnwxfDB8MHxMYXN0UGFzc3xoZG9raWVqbnBpbWFrZWRoYWpoZGxj |
Source: d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: stealc_default2.exe, 0000000E.00000003.2839188523.000000002D131000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: stealc_default2.exe, 0000000E.00000002.2886893072.0000000000CFA000.00000004.00000001.01000000.0000000B.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/ |
Source: stealc_default2.exe, 0000000E.00000003.2839188523.000000002D131000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3217987511.0000000005E89000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mstask.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dui70.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: chartv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: mozglue.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: dwrite.dll | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Section loaded: textshaping.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: dwrite.dll | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Section loaded: textshaping.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: amsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: webio.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: winnsi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: schannel.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: amsi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: userenv.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: profapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: version.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: windowscodecs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: dlnashext.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wpdshext.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000569001\myrdx.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: version.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wldp.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: profapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: dwrite.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: msvcp140_clr0400.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: msisip.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wshext.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: esdsip.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: userenv.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: sxs.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: mpr.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: scrrun.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: propsys.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: linkinfo.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: textshaping.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: textinputframework.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wintypes.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: secur32.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: amsi.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: windowscodecs.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: rstrtmgr.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: windowscodecs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: rstrtmgr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000802001\1.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: shfolder.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: riched20.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: usp10.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: msls31.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: textinputframework.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: coremessaging.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: coremessaging.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: textshaping.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: dwrite.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: riched20.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: usp10.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: msls31.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: windowscodecs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: amsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: webio.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: wbemcomn.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: amsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: wsock32.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000004001\zxcv.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\ofHIebp8us.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Cd0bGrjt9g.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000474001\gold.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\13a34faa3c.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\d0d468f327.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\OFF011F112LUQGJPCDB24W.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5DF164 second address: 5DF169 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5DF169 second address: 5DF16F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5DF16F second address: 5DE987 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e pushad 0x0000000f mov bl, al 0x00000011 mov bx, C8CDh 0x00000015 popad 0x00000016 mov dword ptr [ebp+122D1C87h], eax 0x0000001c push dword ptr [ebp+122D00C9h] 0x00000022 clc 0x00000023 call dword ptr [ebp+122D228Bh] 0x00000029 pushad 0x0000002a pushad 0x0000002b push ecx 0x0000002c or ebx, dword ptr [ebp+122D351Eh] 0x00000032 pop edi 0x00000033 mov edi, dword ptr [ebp+122D35FEh] 0x00000039 popad 0x0000003a xor eax, eax 0x0000003c jc 00007F8A9D254EACh 0x00000042 add dword ptr [ebp+122D1C3Bh], esi 0x00000048 jmp 00007F8A9D254EB6h 0x0000004d mov edx, dword ptr [esp+28h] 0x00000051 mov dword ptr [ebp+122D1AC0h], eax 0x00000057 mov dword ptr [ebp+122D356Ah], eax 0x0000005d cmc 0x0000005e mov esi, 0000003Ch 0x00000063 jmp 00007F8A9D254EB1h 0x00000068 add esi, dword ptr [esp+24h] 0x0000006c jo 00007F8A9D254EA7h 0x00000072 cmc 0x00000073 lodsw 0x00000075 cmc 0x00000076 cld 0x00000077 add eax, dword ptr [esp+24h] 0x0000007b jmp 00007F8A9D254EB8h 0x00000080 mov ebx, dword ptr [esp+24h] 0x00000084 mov dword ptr [ebp+122D1D10h], eax 0x0000008a nop 0x0000008b push eax 0x0000008c push edx 0x0000008d push ebx 0x0000008e pushad 0x0000008f popad 0x00000090 pop ebx 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5DE987 second address: 5DE98D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 759544 second address: 75954C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75954C second address: 75955A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 je 00007F8A9C76F216h 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7596A1 second address: 7596A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7596A5 second address: 7596AB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 759938 second address: 75993C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C644 second address: 75C64A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C64A second address: 75C651 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C651 second address: 5DE987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xor dword ptr [esp], 06A3F338h 0x0000000e or dword ptr [ebp+122D22DBh], esi 0x00000014 push dword ptr [ebp+122D00C9h] 0x0000001a cld 0x0000001b call dword ptr [ebp+122D228Bh] 0x00000021 pushad 0x00000022 pushad 0x00000023 push ecx 0x00000024 or ebx, dword ptr [ebp+122D351Eh] 0x0000002a pop edi 0x0000002b mov edi, dword ptr [ebp+122D35FEh] 0x00000031 popad 0x00000032 xor eax, eax 0x00000034 jc 00007F8A9C76F21Ch 0x0000003a add dword ptr [ebp+122D1C3Bh], esi 0x00000040 jmp 00007F8A9C76F226h 0x00000045 mov edx, dword ptr [esp+28h] 0x00000049 mov dword ptr [ebp+122D1AC0h], eax 0x0000004f mov dword ptr [ebp+122D356Ah], eax 0x00000055 cmc 0x00000056 mov esi, 0000003Ch 0x0000005b jmp 00007F8A9C76F221h 0x00000060 add esi, dword ptr [esp+24h] 0x00000064 jo 00007F8A9C76F217h 0x0000006a cmc 0x0000006b lodsw 0x0000006d cmc 0x0000006e cld 0x0000006f add eax, dword ptr [esp+24h] 0x00000073 jmp 00007F8A9C76F228h 0x00000078 mov ebx, dword ptr [esp+24h] 0x0000007c mov dword ptr [ebp+122D1D10h], eax 0x00000082 nop 0x00000083 push eax 0x00000084 push edx 0x00000085 push ebx 0x00000086 pushad 0x00000087 popad 0x00000088 pop ebx 0x00000089 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C6C4 second address: 75C6C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C6C8 second address: 75C6EA instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8A9C76F216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jc 00007F8A9C76F216h 0x00000013 popad 0x00000014 popad 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 jc 00007F8A9C76F22Ch 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C946 second address: 75C94D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C94D second address: 75C953 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75C953 second address: 75C957 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75CA72 second address: 75CA77 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 76F11C second address: 76F121 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C24B second address: 77C257 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C257 second address: 77C25B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C25B second address: 77C278 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F8A9C76F224h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C530 second address: 77C545 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 ja 00007F8A9D254EA8h 0x0000000b push edi 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C545 second address: 77C54B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C54B second address: 77C564 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C682 second address: 77C687 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C687 second address: 77C68F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C68F second address: 77C693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C924 second address: 77C92D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C92D second address: 77C933 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77C933 second address: 77C937 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77CABE second address: 77CACC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push edx 0x00000007 pushad 0x00000008 push eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77CEBE second address: 77CED6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F8A9D254EB0h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77D19F second address: 77D1DA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F222h 0x00000007 jmp 00007F8A9C76F223h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F8A9C76F222h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77D1DA second address: 77D1E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77D1E0 second address: 77D1E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77DA4B second address: 77DA50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77DA50 second address: 77DA56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77DA56 second address: 77DA5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77DA5A second address: 77DA60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77DA60 second address: 77DA79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F8A9D254EB0h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77DE63 second address: 77DE6D instructions: 0x00000000 rdtsc 0x00000002 je 00007F8A9C76F216h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77DE6D second address: 77DE73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77E10B second address: 77E133 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 jo 00007F8A9C76F216h 0x0000000c pop edi 0x0000000d jmp 00007F8A9C76F225h 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77E133 second address: 77E13D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F8A9D254EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77E13D second address: 77E147 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F8A9C76F216h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78214A second address: 78214F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78214F second address: 782155 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 782155 second address: 782164 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78280F second address: 78283A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007F8A9C76F21Ch 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F8A9C76F225h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78283A second address: 782864 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8A9D254EB8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f pushad 0x00000010 js 00007F8A9D254EA6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 782864 second address: 78286D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78286D second address: 782871 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 782871 second address: 782896 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push edx 0x0000000a jl 00007F8A9C76F21Ch 0x00000010 jp 00007F8A9C76F216h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b push eax 0x0000001c push edx 0x0000001d push ecx 0x0000001e jng 00007F8A9C76F216h 0x00000024 pop ecx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7532BA second address: 7532C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7532C0 second address: 7532C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7532C5 second address: 7532CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7532CC second address: 7532EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 ja 00007F8A9C76F222h 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78A1AD second address: 78A1E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jo 00007F8A9D254EA6h 0x0000000c jmp 00007F8A9D254EB7h 0x00000011 popad 0x00000012 jmp 00007F8A9D254EB4h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78A1E5 second address: 78A1F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8A9C76F21Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78A1F5 second address: 78A1FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78A1FB second address: 78A216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a push esi 0x0000000b pop esi 0x0000000c pop esi 0x0000000d jnp 00007F8A9C76F21Eh 0x00000013 jl 00007F8A9C76F216h 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78982F second address: 78984C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push edx 0x00000006 jmp 00007F8A9D254EB5h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7899C8 second address: 7899CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7899CC second address: 7899D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78A03B second address: 78A05E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F221h 0x00000009 jmp 00007F8A9C76F21Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BB56 second address: 78BB73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BB73 second address: 78BB7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F8A9C76F216h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BC74 second address: 78BC8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BC8B second address: 78BC91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BD85 second address: 78BD8F instructions: 0x00000000 rdtsc 0x00000002 je 00007F8A9D254EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BE33 second address: 78BE37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BE37 second address: 78BE3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78BE3D second address: 78BE41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78C47F second address: 78C483 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78C483 second address: 78C4A2 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8A9C76F216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d pop edx 0x0000000e popad 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8A9C76F21Bh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78C4A2 second address: 78C4A8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78C4A8 second address: 78C4AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78C4AE second address: 78C4B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78C5AD second address: 78C5B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78CA4E second address: 78CA58 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8A9D254EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78DA07 second address: 78DA0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78DA0C second address: 78DA11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 78EA29 second address: 78EAA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 call 00007F8A9C76F226h 0x0000000d mov dword ptr [ebp+122D2BB6h], ecx 0x00000013 pop edi 0x00000014 jbe 00007F8A9C76F216h 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push ebx 0x0000001f call 00007F8A9C76F218h 0x00000024 pop ebx 0x00000025 mov dword ptr [esp+04h], ebx 0x00000029 add dword ptr [esp+04h], 0000001Dh 0x00000031 inc ebx 0x00000032 push ebx 0x00000033 ret 0x00000034 pop ebx 0x00000035 ret 0x00000036 mov dword ptr [ebp+122D1B32h], edi 0x0000003c push 00000000h 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 jmp 00007F8A9C76F227h 0x00000047 pushad 0x00000048 popad 0x00000049 popad 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 791EF5 second address: 791EFB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 791EFB second address: 791F09 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 791F09 second address: 791F5B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a nop 0x0000000b push 00000000h 0x0000000d jmp 00007F8A9D254EACh 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007F8A9D254EA8h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000017h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e xchg eax, ebx 0x0000002f jnp 00007F8A9D254EBEh 0x00000035 push eax 0x00000036 push edx 0x00000037 jp 00007F8A9D254EA6h 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7954F2 second address: 7954F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7954F6 second address: 7954FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 798259 second address: 798281 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F8A9C76F227h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f jg 00007F8A9C76F216h 0x00000015 pop edi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 798281 second address: 7982B9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F8A9D254EB7h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c pushad 0x0000000d mov dword ptr [ebp+124783DAh], eax 0x00000013 mov dh, 14h 0x00000015 popad 0x00000016 push 00000000h 0x00000018 add ebx, 6B0EEC21h 0x0000001e push 00000000h 0x00000020 push eax 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7982B9 second address: 7982C3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7982C3 second address: 7982C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79B250 second address: 79B266 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F222h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79B266 second address: 79B291 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov ebx, 7DBF161Bh 0x00000010 push 00000000h 0x00000012 or edi, 11B6DDE6h 0x00000018 push 00000000h 0x0000001a ja 00007F8A9D254EACh 0x00000020 push eax 0x00000021 push esi 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D1B6 second address: 79D1BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79946A second address: 799477 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007F8A9D254EA6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D1BA second address: 79D1BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79C3FA second address: 79C421 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a js 00007F8A9D254EB2h 0x00000010 jng 00007F8A9D254EACh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D1BE second address: 79D1C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D1C8 second address: 79D219 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007F8A9D254EAEh 0x00000010 nop 0x00000011 mov di, si 0x00000014 jns 00007F8A9D254EAEh 0x0000001a push 00000000h 0x0000001c mov ebx, edx 0x0000001e push 00000000h 0x00000020 mov bx, di 0x00000023 xchg eax, esi 0x00000024 pushad 0x00000025 jbe 00007F8A9D254EA8h 0x0000002b push edi 0x0000002c pop edi 0x0000002d push ecx 0x0000002e pushad 0x0000002f popad 0x00000030 pop ecx 0x00000031 popad 0x00000032 push eax 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 799586 second address: 79958A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D219 second address: 79D224 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F8A9D254EA6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D224 second address: 79D22A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D439 second address: 79D43D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79D43D second address: 79D443 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A0201 second address: 7A029C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jmp 00007F8A9D254EB2h 0x00000011 push 00000000h 0x00000013 sub dword ptr [ebp+122D2C58h], esi 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push edi 0x0000001e call 00007F8A9D254EA8h 0x00000023 pop edi 0x00000024 mov dword ptr [esp+04h], edi 0x00000028 add dword ptr [esp+04h], 00000018h 0x00000030 inc edi 0x00000031 push edi 0x00000032 ret 0x00000033 pop edi 0x00000034 ret 0x00000035 jne 00007F8A9D254EB7h 0x0000003b xchg eax, esi 0x0000003c jnl 00007F8A9D254EB0h 0x00000042 push eax 0x00000043 pushad 0x00000044 push eax 0x00000045 push edx 0x00000046 jmp 00007F8A9D254EB8h 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A122A second address: 7A1248 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F8A9C76F220h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A1248 second address: 7A124C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A124C second address: 7A1252 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79F3A3 second address: 79F433 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F8A9D254EB4h 0x0000000c nop 0x0000000d pushad 0x0000000e and edx, dword ptr [ebp+122D36B6h] 0x00000014 mov dword ptr [ebp+122DB472h], edi 0x0000001a popad 0x0000001b adc ebx, 743149C6h 0x00000021 push dword ptr fs:[00000000h] 0x00000028 add edi, 557AAC7Eh 0x0000002e movsx ebx, dx 0x00000031 mov dword ptr fs:[00000000h], esp 0x00000038 mov edi, 62796BB2h 0x0000003d mov eax, dword ptr [ebp+122D0929h] 0x00000043 mov dword ptr [ebp+122D193Eh], edx 0x00000049 push FFFFFFFFh 0x0000004b push 00000000h 0x0000004d push ebx 0x0000004e call 00007F8A9D254EA8h 0x00000053 pop ebx 0x00000054 mov dword ptr [esp+04h], ebx 0x00000058 add dword ptr [esp+04h], 0000001Dh 0x00000060 inc ebx 0x00000061 push ebx 0x00000062 ret 0x00000063 pop ebx 0x00000064 ret 0x00000065 or dword ptr [ebp+122D280Eh], esi 0x0000006b nop 0x0000006c push eax 0x0000006d push edx 0x0000006e push eax 0x0000006f push edx 0x00000070 jo 00007F8A9D254EA6h 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79F433 second address: 79F44C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F225h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79F44C second address: 79F452 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A201F second address: 7A2023 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A5DB7 second address: 7A5DD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8A9D254EABh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A5DD9 second address: 7A5DDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A5DDF second address: 7A5E63 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov ebx, dword ptr [ebp+122D25DEh] 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ecx 0x00000014 call 00007F8A9D254EA8h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], ecx 0x0000001e add dword ptr [esp+04h], 0000001Bh 0x00000026 inc ecx 0x00000027 push ecx 0x00000028 ret 0x00000029 pop ecx 0x0000002a ret 0x0000002b add dword ptr [ebp+122D233Ah], ecx 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push edx 0x00000036 call 00007F8A9D254EA8h 0x0000003b pop edx 0x0000003c mov dword ptr [esp+04h], edx 0x00000040 add dword ptr [esp+04h], 0000001Dh 0x00000048 inc edx 0x00000049 push edx 0x0000004a ret 0x0000004b pop edx 0x0000004c ret 0x0000004d mov di, 5D53h 0x00000051 mov edi, dword ptr [ebp+122D1CDFh] 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a push edx 0x0000005b jmp 00007F8A9D254EB5h 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A0430 second address: 7A045B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9C76F222h 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F8A9C76F21Dh 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A3F29 second address: 7A3F2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A4FEF second address: 7A4FF5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A4FF5 second address: 7A4FFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A4FFA second address: 7A5093 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9C76F21Ch 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f jmp 00007F8A9C76F229h 0x00000014 pushad 0x00000015 adc al, 00000000h 0x00000018 call 00007F8A9C76F226h 0x0000001d push edi 0x0000001e pop edi 0x0000001f pop eax 0x00000020 popad 0x00000021 push dword ptr fs:[00000000h] 0x00000028 jl 00007F8A9C76F21Ch 0x0000002e mov bx, 2DC1h 0x00000032 mov dword ptr fs:[00000000h], esp 0x00000039 mov dword ptr [ebp+1244BBEEh], eax 0x0000003f mov eax, dword ptr [ebp+122D120Dh] 0x00000045 and edi, 3D477143h 0x0000004b push FFFFFFFFh 0x0000004d mov bh, 94h 0x0000004f push eax 0x00000050 push eax 0x00000051 push edx 0x00000052 jmp 00007F8A9C76F225h 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A6F23 second address: 7A6F2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A6F2A second address: 7A6F2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AFA16 second address: 7AFA1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AFA1C second address: 7AFA39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8A9C76F221h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AFA39 second address: 7AFA3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF173 second address: 7AF187 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F21Eh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF187 second address: 7AF18B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF18B second address: 7AF19D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c jnp 00007F8A9C76F216h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF19D second address: 7AF1BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB9h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF1BA second address: 7AF200 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jnc 00007F8A9C76F22Dh 0x0000000f jmp 00007F8A9C76F227h 0x00000014 ja 00007F8A9C76F21Eh 0x0000001a jo 00007F8A9C76F216h 0x00000020 pushad 0x00000021 popad 0x00000022 pushad 0x00000023 jmp 00007F8A9C76F21Fh 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF200 second address: 7AF206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF206 second address: 7AF20C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF378 second address: 7AF37C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF37C second address: 7AF386 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F8A9C76F21Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF627 second address: 7AF640 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B4C11 second address: 7B4C36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F222h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jnl 00007F8A9C76F218h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B4C36 second address: 7B4C75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F8A9D254EA6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov eax, dword ptr [eax] 0x00000010 jmp 00007F8A9D254EB3h 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F8A9D254EB6h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B4C75 second address: 7B4C7F instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8A9C76F21Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B4E6E second address: 7B4E72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B4E72 second address: 7B4E76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B4E76 second address: 7B4E80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B99F4 second address: 7B9A10 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F8A9C76F21Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 jo 00007F8A9C76F216h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 740DEA second address: 740DFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F8A9D254EAEh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 740DFE second address: 740E02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B8E19 second address: 7B8E1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B8E1F second address: 7B8E23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B8E23 second address: 7B8E2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B8E2D second address: 7B8E34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B8FA5 second address: 7B8FB1 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8A9D254EA6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B8FB1 second address: 7B8FB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B90F4 second address: 7B90F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B90F8 second address: 7B9111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9C76F223h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B9111 second address: 7B913C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB8h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F8A9D254EADh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B913C second address: 7B915B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pushad 0x0000000f popad 0x00000010 ja 00007F8A9C76F216h 0x00000016 pop ecx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B915B second address: 7B9174 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8A9D254EB4h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B92EE second address: 7B92F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B92F4 second address: 7B92F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B9430 second address: 7B943C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F8A9C76F216h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B959E second address: 7B95A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B95A4 second address: 7B95B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 pushad 0x00000007 ja 00007F8A9C76F21Ah 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7B95B9 second address: 7B95E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jng 00007F8A9D254EB5h 0x0000000f pushad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7BC6F6 second address: 7BC712 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9C76F223h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7BC712 second address: 7BC716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 747962 second address: 747968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 747968 second address: 74796C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 74796C second address: 747988 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F8A9C76F216h 0x00000008 jmp 00007F8A9C76F222h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 747988 second address: 74799F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9D254EB1h 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C5D81 second address: 7C5D9F instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8A9C76F216h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jmp 00007F8A9C76F21Eh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C4C5A second address: 7C4C63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C4C63 second address: 7C4C67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C480B second address: 7C481B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9D254EABh 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C481B second address: 7C483E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F227h 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007F8A9C76F216h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C483E second address: 7C4842 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C579D second address: 7C57DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F8A9C76F22Fh 0x0000000a jc 00007F8A9C76F218h 0x00000010 push eax 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007F8A9C76F21Eh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7C57DA second address: 7C57E4 instructions: 0x00000000 rdtsc 0x00000002 js 00007F8A9D254EA6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73BD80 second address: 73BD88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73BD88 second address: 73BD91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CA2B9 second address: 7CA2BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CA2BD second address: 7CA2C9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8A9D254EA6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CA2C9 second address: 7CA2CE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CA95F second address: 7CA984 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB9h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CA984 second address: 7CA988 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CA988 second address: 7CA98E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7D016D second address: 7D017D instructions: 0x00000000 rdtsc 0x00000002 je 00007F8A9C76F222h 0x00000008 jnl 00007F8A9C76F216h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CF023 second address: 7CF047 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F8A9D254EAFh 0x0000000c jmp 00007F8A9D254EAEh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79615A second address: 5DE987 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F8A9C76F216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b mov dword ptr [esp], eax 0x0000000e mov ecx, dword ptr [ebp+122D2770h] 0x00000014 push dword ptr [ebp+122D00C9h] 0x0000001a adc edx, 56B2E6BEh 0x00000020 call dword ptr [ebp+122D228Bh] 0x00000026 pushad 0x00000027 pushad 0x00000028 push ecx 0x00000029 or ebx, dword ptr [ebp+122D351Eh] 0x0000002f pop edi 0x00000030 mov edi, dword ptr [ebp+122D35FEh] 0x00000036 popad 0x00000037 xor eax, eax 0x00000039 jc 00007F8A9C76F21Ch 0x0000003f add dword ptr [ebp+122D1C3Bh], esi 0x00000045 jmp 00007F8A9C76F226h 0x0000004a mov edx, dword ptr [esp+28h] 0x0000004e mov dword ptr [ebp+122D1AC0h], eax 0x00000054 mov dword ptr [ebp+122D356Ah], eax 0x0000005a cmc 0x0000005b mov esi, 0000003Ch 0x00000060 jmp 00007F8A9C76F221h 0x00000065 add esi, dword ptr [esp+24h] 0x00000069 jo 00007F8A9C76F217h 0x0000006f cmc 0x00000070 lodsw 0x00000072 cmc 0x00000073 cld 0x00000074 add eax, dword ptr [esp+24h] 0x00000078 jmp 00007F8A9C76F228h 0x0000007d mov ebx, dword ptr [esp+24h] 0x00000081 mov dword ptr [ebp+122D1D10h], eax 0x00000087 nop 0x00000088 push eax 0x00000089 push edx 0x0000008a push ebx 0x0000008b pushad 0x0000008c popad 0x0000008d pop ebx 0x0000008e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 796386 second address: 79638B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79638B second address: 796399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 796399 second address: 79639F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79639F second address: 7963A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7963A5 second address: 7963A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 796668 second address: 79666C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79666C second address: 79667A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 796826 second address: 796835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007F8A9C76F216h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 796BD6 second address: 796BF9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 796BF9 second address: 796BFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 797055 second address: 79705A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CF340 second address: 7CF34E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9C76F21Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CF4D7 second address: 7CF4DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CF4DD second address: 7CF4E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CF4E2 second address: 7CF4EC instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8A9D254EACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CFB71 second address: 7CFB7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CFD0D second address: 7CFD13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CFD13 second address: 7CFD19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CFD19 second address: 7CFD25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7CFD25 second address: 7CFD2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7D3A4A second address: 7D3A5D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAEh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7D3EB1 second address: 7D3ED1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F225h 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b pop eax 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7D631F second address: 7D6356 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jnc 00007F8A9D254EA6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jp 00007F8A9D254EB7h 0x00000013 push esi 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 jnl 00007F8A9D254EA6h 0x0000001c pop esi 0x0000001d pushad 0x0000001e pushad 0x0000001f popad 0x00000020 push ebx 0x00000021 pop ebx 0x00000022 pushad 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DB7AC second address: 7DB7B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DBAD4 second address: 7DBAEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F8A9D254EB2h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DBAEC second address: 7DBAF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DBC50 second address: 7DBC7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F8A9D254EA6h 0x0000000a popad 0x0000000b jc 00007F8A9D254EDEh 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 jmp 00007F8A9D254EB7h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DBC7C second address: 7DBC8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79698E second address: 796995 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 796995 second address: 7969FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F8A9C76F216h 0x0000000a popad 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push ebx 0x00000012 call 00007F8A9C76F218h 0x00000017 pop ebx 0x00000018 mov dword ptr [esp+04h], ebx 0x0000001c add dword ptr [esp+04h], 0000001Ah 0x00000024 inc ebx 0x00000025 push ebx 0x00000026 ret 0x00000027 pop ebx 0x00000028 ret 0x00000029 sbb edi, 08092347h 0x0000002f mov dword ptr [ebp+1244C329h], edi 0x00000035 mov ebx, dword ptr [ebp+1248AABDh] 0x0000003b mov dword ptr [ebp+122D2290h], edx 0x00000041 add eax, ebx 0x00000043 adc di, 058Bh 0x00000048 nop 0x00000049 jne 00007F8A9C76F21Ah 0x0000004f push eax 0x00000050 je 00007F8A9C76F22Ch 0x00000056 push eax 0x00000057 push edx 0x00000058 jp 00007F8A9C76F216h 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DC0AA second address: 7DC0B0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DCC35 second address: 7DCC39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DCC39 second address: 7DCC4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F8A9D254EACh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7DCC4B second address: 7DCC63 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F8A9C76F223h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E0DF2 second address: 7E0DF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E0DF7 second address: 7E0E2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f je 00007F8A9C76F22Ch 0x00000015 jmp 00007F8A9C76F226h 0x0000001a jc 00007F8A9C76F21Ch 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E0E2E second address: 7E0E38 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8A9D254EB2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E0396 second address: 7E03A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Dh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E0628 second address: 7E0638 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jl 00007F8A9D254EA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E0638 second address: 7E063C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E4B82 second address: 7E4B86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E4301 second address: 7E4305 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E448F second address: 7E4497 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E4497 second address: 7E44BB instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8A9C76F22Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7E486E second address: 7E4872 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7ECE2E second address: 7ECE34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7ECE34 second address: 7ECE56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F8A9D254EB4h 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007F8A9D254EA6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7ECE56 second address: 7ECE5C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EAF39 second address: 7EAF54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAEh 0x00000007 jl 00007F8A9D254EA6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EB0AE second address: 7EB0B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EB448 second address: 7EB450 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EB450 second address: 7EB47A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pushad 0x00000008 jmp 00007F8A9C76F227h 0x0000000d jbe 00007F8A9C76F216h 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EB47A second address: 7EB484 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F8A9D254EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EB484 second address: 7EB488 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EBC62 second address: 7EBCB1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F8A9D254EB2h 0x00000008 jmp 00007F8A9D254EB9h 0x0000000d pop edi 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8A9D254EB7h 0x00000017 pushad 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7EBCB1 second address: 7EBCBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F8A9C76F216h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F0046 second address: 7F005B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F8A9D254EA6h 0x0000000a popad 0x0000000b jnl 00007F8A9D254EAEh 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F0325 second address: 7F0329 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F0329 second address: 7F032D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F032D second address: 7F034A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F8A9C76F223h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F034A second address: 7F034E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F060D second address: 7F065F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F228h 0x00000007 jmp 00007F8A9C76F224h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007F8A9C76F229h 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 push esi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F0AC9 second address: 7F0ACF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7F567C second address: 7F5699 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jmp 00007F8A9C76F223h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FEE44 second address: 7FEE49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FEE49 second address: 7FEE4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FEE4F second address: 7FEE55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FD0DE second address: 7FD0E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FD4EB second address: 7FD4F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop ebx 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FD4F5 second address: 7FD502 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 js 00007F8A9C76F21Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FD502 second address: 7FD50F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FD50F second address: 7FD518 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FD518 second address: 7FD51C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FDDA0 second address: 7FDDAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F8A9C76F216h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FDF2B second address: 7FDF4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB5h 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007F8A9D254EA6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FDF4A second address: 7FDF4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7FEC9B second address: 7FECBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 pop edx 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007F8A9D254EAFh 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8042EF second address: 804309 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F221h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 804309 second address: 804313 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 804313 second address: 804319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 804319 second address: 80431D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 804443 second address: 804449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 804449 second address: 80444D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 80444D second address: 804451 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8103AD second address: 8103B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 810105 second address: 81010E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 81010E second address: 810121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 ja 00007F8A9D254EA6h 0x0000000c jnl 00007F8A9D254EA6h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 810121 second address: 81013C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F8A9C76F216h 0x00000009 jmp 00007F8A9C76F21Ch 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 popad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 81013C second address: 810144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 811940 second address: 81195B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F8A9C76F216h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d jp 00007F8A9C76F21Eh 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 jns 00007F8A9C76F216h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 81195B second address: 811960 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 81C36D second address: 81C38D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a popad 0x0000000b jl 00007F8A9C76F216h 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8A9C76F21Ch 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C0AA second address: 82C0FA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jp 00007F8A9D254EA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F8A9D254EB9h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8A9D254EB7h 0x00000019 jmp 00007F8A9D254EB1h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C0FA second address: 82C110 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8A9C76F21Eh 0x00000008 push edx 0x00000009 pop edx 0x0000000a jnp 00007F8A9C76F216h 0x00000010 push eax 0x00000011 push edx 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C110 second address: 82C114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C114 second address: 82C11A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C447 second address: 82C459 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9D254EACh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C459 second address: 82C48E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9C76F229h 0x00000009 popad 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F8A9C76F21Eh 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C791 second address: 82C797 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82C943 second address: 82C949 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82D536 second address: 82D53A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82D53A second address: 82D553 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007F8A9C76F216h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82D553 second address: 82D557 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 82D557 second address: 82D55D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 83204C second address: 832063 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9D254EB3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 832063 second address: 832067 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 831D7F second address: 831D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 831D87 second address: 831D8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 831D8D second address: 831D98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 831D98 second address: 831D9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 831D9C second address: 831DA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 83C5DD second address: 83C5FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jng 00007F8A9C76F22Bh 0x0000000b jmp 00007F8A9C76F225h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 83C5FD second address: 83C603 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 83C603 second address: 83C607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 83C46E second address: 83C48D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9D254EB9h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 83C48D second address: 83C492 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8469A1 second address: 8469D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB8h 0x00000007 jmp 00007F8A9D254EADh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jnl 00007F8A9D254EB0h 0x00000014 push ebx 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 849D9E second address: 849DA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 849DA4 second address: 849DA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 849BF1 second address: 849BF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 849BF7 second address: 849C0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 jne 00007F8A9D254EA6h 0x0000000e jns 00007F8A9D254EA6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 849C0D second address: 849C2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007F8A9C76F223h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 849C2A second address: 849C36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F8A9D254EA6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 856076 second address: 856082 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F8A9C76F216h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 856082 second address: 856086 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 856086 second address: 856094 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F8A9C76F216h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 856094 second address: 8560A5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jl 00007F8A9D254EACh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8560A5 second address: 8560AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86EF96 second address: 86EF9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86EF9B second address: 86EFA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86EFA0 second address: 86EFCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9D254EB2h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F8A9D254EB1h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86EFCE second address: 86EFE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F223h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86EFE7 second address: 86EFEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86EFEB second address: 86EFEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86F2D4 second address: 86F2E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jbe 00007F8A9D254EA6h 0x0000000b jo 00007F8A9D254EA6h 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86F2E6 second address: 86F2F6 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F8A9C76F222h 0x00000008 jbe 00007F8A9C76F216h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86F441 second address: 86F457 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F8A9D254EB1h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86F8E2 second address: 86F8E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 86FA7C second address: 86FAA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jg 00007F8A9D254EA6h 0x0000000d push esi 0x0000000e pop esi 0x0000000f jmp 00007F8A9D254EB5h 0x00000014 popad 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8741A2 second address: 8741A8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8741A8 second address: 8741BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9D254EB1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8742A9 second address: 8742FF instructions: 0x00000000 rdtsc 0x00000002 jng 00007F8A9C76F216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007F8A9C76F21Ch 0x00000010 jno 00007F8A9C76F216h 0x00000016 popad 0x00000017 push eax 0x00000018 push ebx 0x00000019 push edi 0x0000001a pushad 0x0000001b popad 0x0000001c pop edi 0x0000001d pop ebx 0x0000001e nop 0x0000001f push 00000000h 0x00000021 push edi 0x00000022 call 00007F8A9C76F218h 0x00000027 pop edi 0x00000028 mov dword ptr [esp+04h], edi 0x0000002c add dword ptr [esp+04h], 00000014h 0x00000034 inc edi 0x00000035 push edi 0x00000036 ret 0x00000037 pop edi 0x00000038 ret 0x00000039 push 00000004h 0x0000003b sub dword ptr [ebp+12452C04h], edi 0x00000041 call 00007F8A9C76F219h 0x00000046 push esi 0x00000047 pushad 0x00000048 jg 00007F8A9C76F216h 0x0000004e push eax 0x0000004f push edx 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8742FF second address: 874323 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 ja 00007F8A9D254EA6h 0x0000000f pop eax 0x00000010 pushad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 jns 00007F8A9D254EA6h 0x00000019 popad 0x0000001a popad 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 874323 second address: 874327 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 874327 second address: 87434E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F8A9D254EB7h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8745B5 second address: 8745D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 mov edx, dword ptr [ebp+122D367Ah] 0x0000000d push dword ptr [ebp+122D182Eh] 0x00000013 add dword ptr [ebp+122D1BB8h], edi 0x00000019 push 089630BDh 0x0000001e push esi 0x0000001f push edi 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 875FEC second address: 875FFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 jl 00007F8A9D254EBCh 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 875B2C second address: 875B5E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F8A9C76F228h 0x00000008 jmp 00007F8A9C76F21Eh 0x0000000d pop ebx 0x0000000e je 00007F8A9C76F21Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 875B5E second address: 875B76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8A9D254EB0h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0E1B second address: 50D0E1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0E1F second address: 50D0E23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0E23 second address: 50D0E29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0E29 second address: 50D0E46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9D254EB9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0E46 second address: 50D0E4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0E4A second address: 50D0ED1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F8A9D254EB8h 0x00000010 and si, D0F8h 0x00000015 jmp 00007F8A9D254EABh 0x0000001a popfd 0x0000001b pushfd 0x0000001c jmp 00007F8A9D254EB8h 0x00000021 adc ecx, 104E2B58h 0x00000027 jmp 00007F8A9D254EABh 0x0000002c popfd 0x0000002d popad 0x0000002e mov dword ptr [esp], ebp 0x00000031 pushad 0x00000032 mov edx, ecx 0x00000034 mov dx, ax 0x00000037 popad 0x00000038 mov ebp, esp 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007F8A9D254EB9h 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5110509 second address: 511052A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 jmp 00007F8A9C76F223h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 511052A second address: 5110540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8A9D254EB1h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5110540 second address: 511059A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F8A9C76F227h 0x00000008 pop ecx 0x00000009 movsx edx, si 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 jmp 00007F8A9C76F21Bh 0x00000015 xchg eax, ebp 0x00000016 pushad 0x00000017 call 00007F8A9C76F224h 0x0000001c pushad 0x0000001d popad 0x0000001e pop ecx 0x0000001f pushad 0x00000020 mov dx, EE02h 0x00000024 mov edi, 7985E84Eh 0x00000029 popad 0x0000002a popad 0x0000002b mov ebp, esp 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 511059A second address: 511059E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 511059E second address: 51105A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51105A4 second address: 51105BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9D254EB4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51105BC second address: 51105C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A00CC second address: 50A00DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A00DB second address: 50A00F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F224h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A00F3 second address: 50A0118 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop eax 0x0000000e call 00007F8A9D254EB5h 0x00000013 pop ecx 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0118 second address: 50A0171 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, AC03h 0x00000007 mov dx, si 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F8A9C76F227h 0x00000019 jmp 00007F8A9C76F223h 0x0000001e popfd 0x0000001f call 00007F8A9C76F228h 0x00000024 pop eax 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0171 second address: 50A01CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 5AEDh 0x00000007 mov di, cx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F8A9D254EB2h 0x00000016 sub cx, A5B8h 0x0000001b jmp 00007F8A9D254EABh 0x00000020 popfd 0x00000021 push eax 0x00000022 push edx 0x00000023 pushfd 0x00000024 jmp 00007F8A9D254EB6h 0x00000029 and si, 6018h 0x0000002e jmp 00007F8A9D254EABh 0x00000033 popfd 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A01CF second address: 50A01D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0A9D second address: 50C0AA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0AA3 second address: 50C0AA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0AA9 second address: 50C0AAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0AAD second address: 50C0AE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F8A9C76F224h 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8A9C76F227h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0AE5 second address: 50C0AFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9D254EB4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0624 second address: 50C0628 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0628 second address: 50C062E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C053B second address: 50C056D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007F8A9C76F21Dh 0x0000000b sub ch, FFFFFFC6h 0x0000000e jmp 00007F8A9C76F221h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pop ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C056D second address: 50C0571 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0571 second address: 50C0577 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0294 second address: 50C02A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C02A3 second address: 50C02DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F229h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d call 00007F8A9C76F223h 0x00000012 pop eax 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C02DB second address: 50C0315 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F8A9D254EABh 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 mov esi, 66A55C8Bh 0x00000016 mov ah, 36h 0x00000018 popad 0x00000019 mov ebp, esp 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov cx, 7E7Bh 0x00000022 mov dl, cl 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0315 second address: 50C031B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C031B second address: 50C031F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D00D1 second address: 50D00D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D00D5 second address: 50D00F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F8A9D254EB1h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D00F0 second address: 50D0100 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F21Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5110482 second address: 5110488 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50E02B4 second address: 50E02BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50E02BA second address: 50E02E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8A9D254EB7h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0458 second address: 50C045C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C045C second address: 50C0460 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0460 second address: 50C0466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C0466 second address: 50C046B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C046B second address: 50C04B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov ebp, esp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F8A9C76F224h 0x00000010 sbb cl, 00000028h 0x00000013 jmp 00007F8A9C76F21Bh 0x00000018 popfd 0x00000019 mov ax, 3E1Fh 0x0000001d popad 0x0000001e pop ebp 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F8A9C76F221h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 510072A second address: 5100772 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F8A9D254EAFh 0x00000008 pop ecx 0x00000009 jmp 00007F8A9D254EB9h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007F8A9D254EB3h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100772 second address: 5100777 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100777 second address: 5100794 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ax, 9301h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100794 second address: 5100799 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100799 second address: 510079E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 510079E second address: 51007A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51007A4 second address: 51007C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 jmp 00007F8A9D254EB5h 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51007C7 second address: 51007F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 mov eax, 0D95B4D5h 0x0000000a popad 0x0000000b xchg eax, ecx 0x0000000c jmp 00007F8A9C76F220h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8A9C76F21Eh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51007F4 second address: 5100838 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 0F7F5A84h 0x00000008 mov esi, edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ecx 0x0000000e pushad 0x0000000f jmp 00007F8A9D254EB5h 0x00000014 mov ebx, ecx 0x00000016 popad 0x00000017 mov eax, dword ptr [76FA65FCh] 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F8A9D254EB4h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100838 second address: 5100847 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100847 second address: 51008B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8A9D254EAFh 0x00000009 add ecx, 058B7E5Eh 0x0000000f jmp 00007F8A9D254EB9h 0x00000014 popfd 0x00000015 push ecx 0x00000016 pop edi 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a test eax, eax 0x0000001c jmp 00007F8A9D254EAAh 0x00000021 je 00007F8B0F077F81h 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a call 00007F8A9D254EADh 0x0000002f pop eax 0x00000030 jmp 00007F8A9D254EB1h 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51008B4 second address: 51008FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8A9C76F227h 0x00000009 xor ax, 1E7Eh 0x0000000e jmp 00007F8A9C76F229h 0x00000013 popfd 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov ecx, eax 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51008FB second address: 5100901 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100901 second address: 510091C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F227h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 510091C second address: 51009A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xor eax, dword ptr [ebp+08h] 0x0000000e jmp 00007F8A9D254EB7h 0x00000013 and ecx, 1Fh 0x00000016 jmp 00007F8A9D254EB6h 0x0000001b ror eax, cl 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F8A9D254EADh 0x00000026 and cx, 6F86h 0x0000002b jmp 00007F8A9D254EB1h 0x00000030 popfd 0x00000031 jmp 00007F8A9D254EB0h 0x00000036 popad 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100A9A second address: 5100ACA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dh, 5Bh 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007F8A9C76F224h 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 mov edx, esi 0x00000014 mov si, 3999h 0x00000018 popad 0x00000019 mov ebp, esp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5100ACA second address: 5100AD0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B001E second address: 50B004A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F8A9C76F227h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B004A second address: 50B007D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, di 0x00000006 mov esi, edx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F8A9D254EACh 0x00000011 xchg eax, ebp 0x00000012 jmp 00007F8A9D254EB0h 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov si, di 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B007D second address: 50B0082 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0082 second address: 50B009E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, eax 0x00000005 mov dh, cl 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a and esp, FFFFFFF8h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F8A9D254EABh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B009E second address: 50B00BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F229h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B00BB second address: 50B018F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F8A9D254EAEh 0x0000000f push eax 0x00000010 jmp 00007F8A9D254EABh 0x00000015 xchg eax, ecx 0x00000016 jmp 00007F8A9D254EB6h 0x0000001b xchg eax, ebx 0x0000001c pushad 0x0000001d mov al, 65h 0x0000001f popad 0x00000020 push eax 0x00000021 jmp 00007F8A9D254EAFh 0x00000026 xchg eax, ebx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007F8A9D254EB4h 0x0000002e or ax, 76B8h 0x00000033 jmp 00007F8A9D254EABh 0x00000038 popfd 0x00000039 pushad 0x0000003a pushfd 0x0000003b jmp 00007F8A9D254EB6h 0x00000040 jmp 00007F8A9D254EB5h 0x00000045 popfd 0x00000046 mov edi, ecx 0x00000048 popad 0x00000049 popad 0x0000004a mov ebx, dword ptr [ebp+10h] 0x0000004d push eax 0x0000004e push edx 0x0000004f jmp 00007F8A9D254EB9h 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B018F second address: 50B01F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8A9C76F227h 0x00000009 add ax, 97EEh 0x0000000e jmp 00007F8A9C76F229h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007F8A9C76F220h 0x0000001a and esi, 34B76768h 0x00000020 jmp 00007F8A9C76F21Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 xchg eax, esi 0x0000002a pushad 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e pop edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B01F5 second address: 50B0222 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ch, 3Ah 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e movzx ecx, dx 0x00000011 mov ax, bx 0x00000014 popad 0x00000015 xchg eax, esi 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F8A9D254EACh 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B032C second address: 50B037B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov esi, 64509161h 0x0000000b popad 0x0000000c mov edx, dword ptr [esi+44h] 0x0000000f jmp 00007F8A9C76F21Ch 0x00000014 or edx, dword ptr [ebp+0Ch] 0x00000017 jmp 00007F8A9C76F220h 0x0000001c test edx, 61000000h 0x00000022 jmp 00007F8A9C76F220h 0x00000027 jne 00007F8B0E5DD52Eh 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B037B second address: 50B0383 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov si, dx 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0383 second address: 50B03E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8A9C76F222h 0x00000009 add ch, FFFFFFB8h 0x0000000c jmp 00007F8A9C76F21Bh 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007F8A9C76F228h 0x00000018 or eax, 1A74D718h 0x0000001e jmp 00007F8A9C76F21Bh 0x00000023 popfd 0x00000024 popad 0x00000025 pop edx 0x00000026 pop eax 0x00000027 test byte ptr [esi+48h], 00000001h 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B03E0 second address: 50B03E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B03E4 second address: 50B03EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B03EA second address: 50B042B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8A9D254EB8h 0x00000008 movzx eax, bx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jne 00007F8B0F0C313Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F8A9D254EB8h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B042B second address: 50B0430 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A08E5 second address: 50A094A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ecx, ebx 0x0000000d pushad 0x0000000e mov edi, 783B7B5Ch 0x00000013 mov ax, dx 0x00000016 popad 0x00000017 popad 0x00000018 xchg eax, ebp 0x00000019 pushad 0x0000001a mov di, A160h 0x0000001e pushfd 0x0000001f jmp 00007F8A9D254EB9h 0x00000024 add esi, 59A8D666h 0x0000002a jmp 00007F8A9D254EB1h 0x0000002f popfd 0x00000030 popad 0x00000031 mov ebp, esp 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 popad 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A094A second address: 50A095D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A095D second address: 50A0963 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0963 second address: 50A0974 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and esp, FFFFFFF8h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0974 second address: 50A0978 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0978 second address: 50A097E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A097E second address: 50A09F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8A9D254EB1h 0x00000009 sub eax, 17F557D6h 0x0000000f jmp 00007F8A9D254EB1h 0x00000014 popfd 0x00000015 jmp 00007F8A9D254EB0h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d xchg eax, ebx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushad 0x00000022 popad 0x00000023 pushfd 0x00000024 jmp 00007F8A9D254EB3h 0x00000029 and eax, 19A141BEh 0x0000002f jmp 00007F8A9D254EB9h 0x00000034 popfd 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A09F9 second address: 50A09FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A09FF second address: 50A0A03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0A03 second address: 50A0A4B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F223h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F8A9C76F229h 0x00000011 xchg eax, ebx 0x00000012 pushad 0x00000013 mov bx, si 0x00000016 mov di, ax 0x00000019 popad 0x0000001a xchg eax, esi 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov bl, FEh 0x00000020 mov eax, 43774FBFh 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0A4B second address: 50A0A7C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8A9D254EB3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0A7C second address: 50A0A82 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0A82 second address: 50A0ABC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F8A9D254EB0h 0x0000000f mov esi, dword ptr [ebp+08h] 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F8A9D254EAAh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0ABC second address: 50A0AC0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0AC0 second address: 50A0AC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0AC6 second address: 50A0B09 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b jmp 00007F8A9C76F221h 0x00000010 test esi, esi 0x00000012 jmp 00007F8A9C76F21Eh 0x00000017 je 00007F8B0E5E4AA9h 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 mov ecx, 31AB8BC3h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0B09 second address: 50A0B64 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F8A9D254EB8h 0x00000008 sub al, FFFFFF88h 0x0000000b jmp 00007F8A9D254EABh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushfd 0x00000016 jmp 00007F8A9D254EB6h 0x0000001b jmp 00007F8A9D254EB5h 0x00000020 popfd 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0B64 second address: 50A0BA0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F220h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a cmp dword ptr [esi+08h], DDEEDDEEh 0x00000011 jmp 00007F8A9C76F220h 0x00000016 mov ecx, esi 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F8A9C76F21Ah 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0BA0 second address: 50A0BAF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0BAF second address: 50A0BE4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F229h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F8B0E5E49EDh 0x0000000f pushad 0x00000010 mov ax, F723h 0x00000014 popad 0x00000015 test byte ptr [76FA6968h], 00000002h 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0BE4 second address: 50A0BEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0BEB second address: 50A0C10 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 mov edx, esi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007F8B0E5E49D6h 0x00000011 jmp 00007F8A9C76F21Ch 0x00000016 mov edx, dword ptr [ebp+0Ch] 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C10 second address: 50A0C14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C14 second address: 50A0C50 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pop edi 0x00000008 popad 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F8A9C76F21Eh 0x0000000f push eax 0x00000010 jmp 00007F8A9C76F21Bh 0x00000015 xchg eax, ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F8A9C76F225h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C50 second address: 50A0C56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C56 second address: 50A0C5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C5A second address: 50A0C5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C5E second address: 50A0C6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C6D second address: 50A0C73 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C73 second address: 50A0C79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C79 second address: 50A0C7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C7D second address: 50A0C8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C8E second address: 50A0C92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C92 second address: 50A0C98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C98 second address: 50A0C9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0C9E second address: 50A0CA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0CEF second address: 50A0CF5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0CF5 second address: 50A0CFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0CFB second address: 50A0CFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0CFF second address: 50A0D0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0D0E second address: 50A0D12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0D12 second address: 50A0D18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0D18 second address: 50A0D3B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esp, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0D3B second address: 50A0D3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50A0D3F second address: 50A0D5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0C56 second address: 50B0CB3 instructions: 0x00000000 rdtsc 0x00000002 mov edi, 77532DB6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F8A9C76F21Ah 0x00000012 adc ah, FFFFFFA8h 0x00000015 jmp 00007F8A9C76F21Bh 0x0000001a popfd 0x0000001b pushfd 0x0000001c jmp 00007F8A9C76F228h 0x00000021 jmp 00007F8A9C76F225h 0x00000026 popfd 0x00000027 popad 0x00000028 xchg eax, ebp 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0CB3 second address: 50B0CB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0CB7 second address: 50B0CBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0CBD second address: 50B0CC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0CC3 second address: 50B0D1C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e mov ebx, eax 0x00000010 pushfd 0x00000011 jmp 00007F8A9C76F21Ah 0x00000016 or esi, 4C98A4C8h 0x0000001c jmp 00007F8A9C76F21Bh 0x00000021 popfd 0x00000022 popad 0x00000023 pop ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 movsx edi, cx 0x0000002a pushfd 0x0000002b jmp 00007F8A9C76F21Ch 0x00000030 add ah, 00000028h 0x00000033 jmp 00007F8A9C76F21Bh 0x00000038 popfd 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0D1C second address: 50B0D22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0D22 second address: 50B0D26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0A0D second address: 50B0A13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0A13 second address: 50B0A17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50B0A17 second address: 50B0A5D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e jmp 00007F8A9D254EB6h 0x00000013 mov ebp, esp 0x00000015 pushad 0x00000016 mov dl, ch 0x00000018 popad 0x00000019 pop ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F8A9D254EABh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130C00 second address: 5130C63 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F8A9C76F229h 0x00000011 sbb esi, 280018C6h 0x00000017 jmp 00007F8A9C76F221h 0x0000001c popfd 0x0000001d push eax 0x0000001e push edx 0x0000001f pop esi 0x00000020 pop edi 0x00000021 popad 0x00000022 mov ebp, esp 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 mov ax, bx 0x0000002a call 00007F8A9C76F227h 0x0000002f pop esi 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130C63 second address: 5130C69 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130021 second address: 513003C instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 345B5A45h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8A9C76F21Eh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 513003C second address: 5130042 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130042 second address: 5130046 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130046 second address: 5130064 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f movsx ebx, cx 0x00000012 mov di, cx 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130064 second address: 513009E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8A9C76F227h 0x00000009 add al, FFFFFFFEh 0x0000000c jmp 00007F8A9C76F229h 0x00000011 popfd 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 513009E second address: 51300CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov ebp, esp 0x00000009 jmp 00007F8A9D254EACh 0x0000000e pop ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F8A9D254EB7h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51300CD second address: 51300E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9C76F224h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120DBE second address: 5120DC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120DC2 second address: 5120DC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120DC8 second address: 5120E06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, bx 0x00000006 push edx 0x00000007 pop esi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov eax, 2F469859h 0x00000014 pushfd 0x00000015 jmp 00007F8A9D254EB6h 0x0000001a adc esi, 3CACFEE8h 0x00000020 jmp 00007F8A9D254EABh 0x00000025 popfd 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50C004D second address: 50C0053 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 513030E second address: 51303A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F8A9D254EB6h 0x0000000f mov ebp, esp 0x00000011 jmp 00007F8A9D254EB0h 0x00000016 push dword ptr [ebp+0Ch] 0x00000019 jmp 00007F8A9D254EB0h 0x0000001e push dword ptr [ebp+08h] 0x00000021 jmp 00007F8A9D254EB0h 0x00000026 call 00007F8A9D254EA9h 0x0000002b pushad 0x0000002c movzx eax, di 0x0000002f jmp 00007F8A9D254EB3h 0x00000034 popad 0x00000035 push eax 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007F8A9D254EB4h 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51303A4 second address: 51303AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51303AA second address: 51303F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jmp 00007F8A9D254EB1h 0x00000014 mov eax, dword ptr [eax] 0x00000016 jmp 00007F8A9D254EB1h 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F8A9D254EACh 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51303F7 second address: 513040D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 513040D second address: 5130411 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130411 second address: 5130417 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0393 second address: 50D03A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8A9D254EACh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D03A3 second address: 50D03A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D03A7 second address: 50D03D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007F8A9D254EACh 0x0000000e mov dword ptr [esp], ebp 0x00000011 jmp 00007F8A9D254EB0h 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D03D7 second address: 50D03DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D03DB second address: 50D03DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D03DF second address: 50D03E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D03E5 second address: 50D0448 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9D254EB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push FFFFFFFEh 0x0000000b jmp 00007F8A9D254EB0h 0x00000010 push 109C4EF3h 0x00000015 jmp 00007F8A9D254EB1h 0x0000001a xor dword ptr [esp], 66648EEBh 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F8A9D254EB8h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0448 second address: 50D0457 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F21Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0457 second address: 50D0480 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 38h 0x00000005 mov dx, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b call 00007F8A9D254EA9h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov edi, 2B60D4AAh 0x00000018 call 00007F8A9D254EABh 0x0000001d pop esi 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D0480 second address: 50D04B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8A9C76F226h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F8A9C76F21Bh 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D04B0 second address: 50D04B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 50D04B4 second address: 50D04BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: InstallUtil.exe, 00000014.00000002.3013913479.00000000007BE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWc |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: Amcache.hve.13.dr | Binary or memory string: vmci.sys |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: Amcache.hve.13.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.13.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: gold.exe, 00000013.00000002.2774776253.0000000003571000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: model0Microsoft|VMWare|Virtual |
Source: Amcache.hve.13.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.13.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: axplong.exe, axplong.exe, 00000007.00000002.4556562493.0000000000452000.00000040.00000001.01000000.00000007.sdmp, d0d468f327.exe, 00000024.00000002.3867006295.000000000042C000.00000040.00000001.01000000.00000020.sdmp, OFF011F112LUQGJPCDB24W.exe, 00000025.00000000.3006027881.00000000010B8000.00000080.00000001.01000000.00000021.sdmp, OFF011F112LUQGJPCDB24W.exe, 00000025.00000002.3120833121.00000000010B8000.00000040.00000001.01000000.00000021.sdmp, 4ad48d7d65.exe, 0000002B.00000002.3146758221.0000000000826000.00000040.00000001.01000000.00000023.sdmp | Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__ |
Source: Amcache.hve.13.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: Amcache.hve.13.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.00000000007EE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareVMwareq |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: MSBuild.exe, 00000017.00000002.3193253820.00000000051F8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlli |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: Amcache.hve.13.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: Amcache.hve.13.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.13.dr | Binary or memory string: vmci.syshbin` |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: Amcache.hve.13.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: stealc_default2.exe, 0000000E.00000002.2886105690.000000000081E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWpE |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: MSBuild.exe, 00000017.00000002.3053254646.0000000002CC5000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: axplong.exe, 00000007.00000002.4561179734.000000000105B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW8@ |
Source: file.exe, 00000000.00000002.2175873508.0000000000762000.00000040.00000001.01000000.00000003.sdmp, axplong.exe, 00000002.00000002.2198654465.0000000000452000.00000040.00000001.01000000.00000007.sdmp, axplong.exe, 00000003.00000002.2198746203.0000000000452000.00000040.00000001.01000000.00000007.sdmp, axplong.exe, 00000007.00000002.4556562493.0000000000452000.00000040.00000001.01000000.00000007.sdmp, d0d468f327.exe, 00000024.00000002.3867006295.000000000042C000.00000040.00000001.01000000.00000020.sdmp, OFF011F112LUQGJPCDB24W.exe, 00000025.00000002.3120833121.00000000010B8000.00000040.00000001.01000000.00000021.sdmp, 4ad48d7d65.exe, 0000002B.00000002.3146758221.0000000000826000.00000040.00000001.01000000.00000023.sdmp | Binary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please, |
Source: InstallUtil.exe, 00000014.00000002.3012882720.000000000077C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWhJ|%SystemRoot%\system32\mswsock.dll^ |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: Amcache.hve.13.dr | Binary or memory string: VMware |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: d0d468f327.exe, 00000024.00000003.3187304170.0000000005B69000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: - GDCDYNVMware20,11696428655p |
Source: Amcache.hve.13.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 0000000E.00000002.2886105690.000000000084E000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000014.00000002.3013913479.00000000007BE000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3860117485.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000003.3859535207.0000000001314000.00000004.00000020.00020000.00000000.sdmp, d0d468f327.exe, 00000024.00000002.3868990763.0000000001314000.00000004.00000020.00020000.00000000.sdmp, 4ad48d7d65.exe, 0000002B.00000002.3186818225.000000000123F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: Amcache.hve.13.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.00000000011CE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareVMware^ |
Source: d0d468f327.exe, 00000024.00000003.3187304170.0000000005B69000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: YNVMware |
Source: file.exe, 00000000.00000003.2136722669.000000000115F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}&< |
Source: Amcache.hve.13.dr | Binary or memory string: VMware20,1 |
Source: gold.exe, 00000013.00000002.2774776253.0000000003571000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem |
Source: Amcache.hve.13.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.13.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.13.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.00000000011CE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMwareVMware |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: Amcache.hve.13.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.13.dr | Binary or memory string: VMware VMCI Bus Device |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: Amcache.hve.13.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.000000000123F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW; |
Source: Amcache.hve.13.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.13.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.13.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.13.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: axplong.exe, 00000007.00000002.4561179734.000000000108D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW2 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: Amcache.hve.13.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: Amcache.hve.13.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: d0d468f327.exe, 00000024.00000003.3189850986.0000000005C3F000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: Jurisdiction.pif, 00000029.00000002.4580472660.0000000001200000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: 4ad48d7d65.exe, 0000002B.00000002.3186818225.0000000001216000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW(C$ |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: OFF011F112LUQGJPCDB24W.exe, 00000025.00000000.3006027881.00000000010B8000.00000080.00000001.01000000.00000021.sdmp | Binary or memory string: F\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please, |
Source: Amcache.hve.13.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.13.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: d0d468f327.exe, 00000024.00000002.3868454285.00000000012BE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWH |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: MSBuild.exe, 00000017.00000002.3124675107.0000000003B76000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |