Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: INSERT_KEY_HERE |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 01 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 03 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 20 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 25 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetProcAddress |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: LoadLibraryA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: lstrcatA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: OpenEventA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CreateEventA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CloseHandle |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Sleep |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetUserDefaultLangID |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: VirtualAllocExNuma |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: VirtualFree |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetSystemInfo |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: VirtualAlloc |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: HeapAlloc |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetComputerNameA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: lstrcpyA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetProcessHeap |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetCurrentProcess |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: lstrlenA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ExitProcess |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GlobalMemoryStatusEx |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetSystemTime |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SystemTimeToFileTime |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: advapi32.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: gdi32.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: user32.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: crypt32.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ntdll.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetUserNameA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CreateDCA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetDeviceCaps |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ReleaseDC |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CryptStringToBinaryA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sscanf |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: VMwareVMware |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: HAL9TH |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: JohnDoe |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: DISPLAY |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %hu/%hu/%hu |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: http://185.215.113.17 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 00x00 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: !| |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: /2fb6c2cc8dce150a.php |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: /f1ddeb6592c03206/ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: default_valenciga |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetEnvironmentVariableA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetFileAttributesA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GlobalLock |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: HeapFree |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetFileSize |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GlobalSize |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CreateToolhelp32Snapshot |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: IsWow64Process |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Process32Next |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetLocalTime |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: FreeLibrary |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetTimeZoneInformation |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetSystemPowerStatus |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetVolumeInformationA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetWindowsDirectoryA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Process32First |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetLocaleInfoA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetUserDefaultLocaleName |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetModuleFileNameA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: DeleteFileA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: FindNextFileA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: LocalFree |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: FindClose |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SetEnvironmentVariableA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: LocalAlloc |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetFileSizeEx |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ReadFile |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SetFilePointer |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: WriteFile |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CreateFileA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: FindFirstFileA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CopyFileA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: VirtualProtect |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetLogicalProcessorInformationEx |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetLastError |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: lstrcpynA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: MultiByteToWideChar |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GlobalFree |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: WideCharToMultiByte |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GlobalAlloc |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: OpenProcess |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: TerminateProcess |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetCurrentProcessId |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: gdiplus.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ole32.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: bcrypt.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: wininet.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: shlwapi.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: shell32.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: psapi.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: rstrtmgr.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CreateCompatibleBitmap |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SelectObject |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: BitBlt |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: DeleteObject |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CreateCompatibleDC |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdipGetImageEncodersSize |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdipGetImageEncoders |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdipCreateBitmapFromHBITMAP |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdiplusStartup |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdiplusShutdown |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdipSaveImageToStream |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdipDisposeImage |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GdipFree |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetHGlobalFromStream |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CreateStreamOnHGlobal |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CoUninitialize |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CoInitialize |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CoCreateInstance |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: BCryptGenerateSymmetricKey |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: BCryptCloseAlgorithmProvider |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: BCryptDecrypt |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: BCryptSetProperty |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: BCryptDestroyKey |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: BCryptOpenAlgorithmProvider |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetWindowRect |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetDesktopWindow |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetDC |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CloseWindow |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: wsprintfA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: EnumDisplayDevicesA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetKeyboardLayoutList |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CharToOemW |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: wsprintfW |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RegQueryValueExA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RegEnumKeyExA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RegOpenKeyExA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RegCloseKey |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RegEnumValueA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CryptBinaryToStringA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CryptUnprotectData |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SHGetFolderPathA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ShellExecuteExA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: InternetOpenUrlA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: InternetConnectA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: InternetCloseHandle |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: InternetOpenA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: HttpSendRequestA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: HttpOpenRequestA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: InternetReadFile |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: InternetCrackUrlA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: StrCmpCA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: StrStrA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: StrCmpCW |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: PathMatchSpecA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: GetModuleFileNameExA |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RmStartSession |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RmRegisterResources |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RmGetList |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: RmEndSession |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_open |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_prepare_v2 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_step |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_column_text |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_finalize |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_close |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_column_bytes |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3_column_blob |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: encrypted_key |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: PATH |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: C:\ProgramData\nss3.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: NSS_Init |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: NSS_Shutdown |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: PK11_GetInternalKeySlot |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: PK11_FreeSlot |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: PK11_Authenticate |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: PK11SDR_Decrypt |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: C:\ProgramData\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT origin_url, username_value, password_value FROM logins |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: browser: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: profile: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: url: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: login: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: password: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Opera |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: OperaGX |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Network |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: cookies |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: .txt |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: TRUE |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: FALSE |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: autofill |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT name, value FROM autofill |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: history |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT url FROM urls LIMIT 1000 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: cc |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: name: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: month: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: year: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: card: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Cookies |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Login Data |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Web Data |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: History |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: logins.json |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: formSubmitURL |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: usernameField |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: encryptedUsername |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: encryptedPassword |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: guid |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT fieldname, value FROM moz_formhistory |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SELECT url FROM moz_places LIMIT 1000 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: cookies.sqlite |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: formhistory.sqlite |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: places.sqlite |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: plugins |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Local Extension Settings |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Sync Extension Settings |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: IndexedDB |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Opera Stable |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Opera GX Stable |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: CURRENT |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: chrome-extension_ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: _0.indexeddb.leveldb |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Local State |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: profiles.ini |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: chrome |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: opera |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: firefox |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: wallets |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %08lX%04lX%lu |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ProductName |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: x32 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: x64 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %d/%d/%d %d:%d:%d |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ProcessorNameString |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: DisplayName |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: DisplayVersion |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Network Info: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - IP: IP? |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Country: ISO? |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: System Summary: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - HWID: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - OS: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Architecture: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - UserName: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Computer Name: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Local Time: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - UTC: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Language: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Keyboards: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Laptop: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Running Path: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - CPU: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Threads: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Cores: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - RAM: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - Display Resolution: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: - GPU: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: User Agents: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Installed Apps: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: All Users: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Current User: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Process List: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: system_info.txt |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: freebl3.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: mozglue.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: msvcp140.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: nss3.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: softokn3.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: vcruntime140.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \Temp\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: .exe |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: runas |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: open |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: /c start |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %DESKTOP% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %APPDATA% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %LOCALAPPDATA% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %USERPROFILE% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %DOCUMENTS% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %PROGRAMFILES% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %PROGRAMFILES_86% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: %RECENT% |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: *.lnk |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: files |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \discord\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \Local Storage\leveldb\CURRENT |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \Local Storage\leveldb |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \Telegram Desktop\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: key_datas |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: D877F783D5D3EF8C* |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: map* |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: A7FDF864FBC10B77* |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: A92DAA6EA6F891F2* |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: F8806DD0C461824F* |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Telegram |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Tox |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: *.tox |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: *.ini |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Password |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 00000001 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 00000002 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 00000003 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: 00000004 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \Outlook\accounts.txt |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Pidgin |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \.purple\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: accounts.xml |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: dQw4w9WgXcQ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: token: |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Software\Valve\Steam |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: SteamPath |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \config\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ssfn* |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: config.vdf |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: DialogConfig.vdf |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: DialogConfigOverlay*.vdf |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: libraryfolders.vdf |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: loginusers.vdf |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \Steam\ |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: sqlite3.dll |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: browsers |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: done |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: soft |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: \Discord\tokens.txt |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: /c timeout /t 5 & del /f /q " |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: " & del "C:\ProgramData\*.dll"" & exit |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: C:\Windows\system32\cmd.exe |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: https |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Content-Type: multipart/form-data; boundary=---- |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: POST |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: HTTP/1.1 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: Content-Disposition: form-data; name=" |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: hwid |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: build |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: token |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: file_name |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: file |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: message |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 |
Source: 6.2.stealc_default2.exe.f10000.0.unpack |
String decryptor: screenshot.jpg |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: servicedny.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: authorisev.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: faulteyotk.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: dilemmadu.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: contemteny.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: goalyfeastz.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: opposezmny.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: seallysl.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: computeryrati.site |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: TeslaBrowser/5.5 |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: - Screen Resoluton: |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: - Physical Installed Memory: |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: Workgroup: - |
Source: 36.0.RDX123456.exe.940000.0.unpack |
String decryptor: 4SD0y4--RLREBORN |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: http://.css |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: http://.jpg |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://127.0.0.1:27060 |
Source: GOLD1234.exe, 00000025.00000003.3476176212.0000000000F8B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/ |
Source: axplong.exe, 00000005.00000003.3274795036.00000000014EF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FD7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.2905390578.00000000014F5000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3271971261.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3274795036.00000000014F4000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3274226781.0000000005FD7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3273657100.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.2912523697.0000000005F85000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3273887118.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php |
Source: axplong.exe, 00000005.00000003.3273657100.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php# |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3273887118.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php1507001 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3273887118.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php4 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3273887118.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php:y |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3273887118.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpAppData |
Source: axplong.exe, 00000005.00000003.3273657100.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpded |
Source: axplong.exe, 00000005.00000003.3273657100.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncoded |
Source: axplong.exe, 00000005.00000003.3273657100.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncoded5 |
Source: axplong.exe, 00000005.00000003.3273887118.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpnu |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.3273887118.0000000005FE1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpppData |
Source: new_v8.exe |
String found in binary or memory: http://185.215.113.16/mine/random.exe |
Source: new_v8.exe, 0000001B.00000003.3586627682.0000000001238000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.3586761744.0000000001241000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/mine/random.exep |
Source: new_v8.exe, new_v8.exe, 0000001B.00000003.3586809787.000000000123A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.3586627682.0000000001238000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3489672229.0000000000F6A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: stealc_default2.exe, 00000006.00000002.2613116477.00000000010DB000.00000004.00000001.01000000.00000009.sdmp, stealc_default2.exe, 00000006.00000002.2615206943.000000000176E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000006.00000002.2615206943.000000000176E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/ |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php) |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php3 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php7 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php= |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpA |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpC:q |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpCoinomi |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpEx9 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpJS |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpS=o |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpU |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpZ |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpdo% |
Source: stealc_default2.exe, 00000006.00000002.2615206943.0000000001760000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpm |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpmainnet |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpnomi |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpq |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpsimple-storage.json |
Source: stealc_default2.exe, 00000006.00000002.2613116477.00000000010DB000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phption: |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/freebl3.dll |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/mozglue.dll |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/mozglue.dll$ |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/mozglue.dllb |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/mozglue.dlln |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/msvcp140.dll |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/msvcp140.dllp |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/msvcp140.dllt |
Source: stealc_default2.exe, 00000006.00000002.2615206943.000000000176E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/nss3.dll6= |
Source: stealc_default2.exe, 00000006.00000002.2615206943.000000000176E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/nss3.dllL= |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dll |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dll6 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dll8 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dllJ |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dllN |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dllP |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/sqlite3.dll |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dllO |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017B0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dlla |
Source: stealc_default2.exe, 00000006.00000002.2615206943.000000000176E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17/yR |
Source: stealc_default2.exe, 00000006.00000002.2613116477.00000000010DB000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: http://185.215.113.172fb6c2cc8dce150a.phption: |
Source: stealc_default2.exe, 00000006.00000002.2615206943.000000000176E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17S |
Source: stealc_default2.exe, 00000006.00000002.2615206943.000000000176E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.17iR |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F2E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206 |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F87000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/ |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F87000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F2E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php#k |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F87000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php/ |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F87000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/6c4adf523b719729.phpI |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F87000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/6c4adf523b719729.phpe |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F2E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/6c4adf523b719729.phpq |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F87000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/I |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F2E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/bG |
Source: f6f4816752.exe, 00000031.00000002.3155168475.0000000000F87000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/j |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe, 00000009.00000002.2607696656.000000000041F000.00000004.00000001.01000000.0000000B.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://crl.globalsign.net/root-r3.crl0 |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: http://home.sevjoi17sr.top/TCQEoezkVqyvrJjqBhZs12 |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: http://html4/loose.dtd |
Source: splwow64.exe, 00000009.00000002.2607663846.0000000000408000.00000002.00000001.01000000.0000000B.sdmp, splwow64.exe, 00000009.00000000.2544251638.0000000000408000.00000002.00000001.01000000.0000000B.sdmp, 0b44ippu.exe, 0000002E.00000002.3064076642.0000000000408000.00000002.00000001.01000000.0000001C.sdmp, 0b44ippu.exe, 0000002E.00000000.2955036581.0000000000408000.00000002.00000001.01000000.0000001C.sdmp, splwow64[1].exe.5.dr |
String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp, splwow64[1].exe.5.dr |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://ocsp.digicert.com0A |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp, splwow64[1].exe.5.dr |
String found in binary or memory: http://ocsp.digicert.com0C |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0N |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0O |
Source: splwow64[1].exe.5.dr |
String found in binary or memory: http://ocsp.digicert.com0X |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, splwow64.exe, 00000009.00000002.2607696656.000000000041F000.00000004.00000001.01000000.0000000B.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0 |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000000.2596749853.0000000000E79000.00000002.00000001.01000000.0000000E.sdmp, EcoCraft.scr, 0000001C.00000000.2676298828.00000000007E9000.00000002.00000001.01000000.00000011.sdmp, EcoCraft.scr, 00000020.00000002.2778743195.00000000007E9000.00000002.00000001.01000000.00000011.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.carterandcone.coml |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp, splwow64[1].exe.5.dr |
String found in binary or memory: http://www.digicert.com/CPS0 |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designers? |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fontbureau.com/designersG |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.fonts.com |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.goodfont.co.kr |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: shop.exe, 00000032.00000003.3571108803.0000000001640000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3237340411.0000000001631000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.microsoft.cH |
Source: stealc_default2.exe, stealc_default2.exe, 00000006.00000002.2674484590.000000006BFCD000.00000002.00000001.01000000.0000000D.sdmp, mozglue[1].dll.6.dr |
String found in binary or memory: http://www.mozilla.com/en-US/blocklist/ |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sajatypeworks.com |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sakkal.com |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.sandoll.co.kr |
Source: stealc_default2.exe, 00000006.00000002.2674136604.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp, stealc_default2.exe, 00000006.00000002.2642192619.000000001BAF3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.sqlite.org/copyright.html. |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.tiro.com |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.typography.netD |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.urwpp.deDPlease |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: dac4554719.exe, 0000001D.00000002.3179400913.000000001C672000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.zhongyicts.com.cn |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.c.lencr.org/0 |
Source: new_v8.exe, 0000001B.00000003.2781801201.00000000039B5000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3018781566.00000000059FD000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3063024023.00000000039C0000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3181587075.0000000003B42000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.i.lencr.org/0 |
Source: new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: https://ace-snapper-privately.ngrok-free.app/test/test |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: https://ace-snapper-privately.ngrok-free.app/test/testFailed |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://api.steampowered.com/ |
Source: new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2785879104.000000000123B000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3102164882.0000000003981000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3218081015.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417. |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, new_v8.exe, 0000001B.00000003.2806388505.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804901138.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2879371414.000000000123A000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3218081015.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ |
Source: new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ep |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.epnacl |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://checkout.steampowered.com/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=uDUW |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v= |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l= |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=2UcHUv7TDL_s& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl |
Source: new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l= |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67& |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1 |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0& |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2785879104.000000000123B000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3102164882.0000000003981000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3218081015.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2806388505.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804901138.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2879371414.000000000123A000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3218081015.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: https://curl.se/docs/hsts.html |
Source: Offnewhere.exe, 00000007.00000000.2483037403.000000000087B000.00000002.00000001.01000000.0000000A.sdmp |
String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: f6f4816752.exe, 00000031.00000003.3036164555.0000000004C2B000.00000004.00001000.00020000.00000000.sdmp, f6f4816752.exe, 00000031.00000002.3149193410.000000000031C000.00000040.00000001.01000000.0000001D.sdmp |
String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support |
Source: new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: shop.exe, 00000032.00000003.3571302943.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000002.3575188417.000000000164B000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3137226821.0000000001656000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3573133874.000000000164A000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3318669001.00000000015CD000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3385557240.0000000003B23000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3132876164.0000000003B20000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3361156674.0000000001652000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3172906832.0000000001652000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3137274134.000000000165E000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000002.3577128165.0000000003B23000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3318239726.0000000003B20000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3175294707.0000000003B22000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3146895960.0000000003B20000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/ |
Source: shop.exe, 00000032.00000003.3160434239.0000000003B28000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/8 |
Source: shop.exe, 00000032.00000003.3161659780.0000000003B28000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/= |
Source: GOLD1234.exe, 00000025.00000003.3420299008.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3234339463.0000000000F13000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/? |
Source: shop.exe, 00000032.00000003.3160434239.0000000003B28000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3161659780.0000000003B28000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/?m |
Source: shop.exe, 00000032.00000003.3571108803.0000000001646000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000002.3575188417.000000000164B000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3573133874.000000000164A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/B |
Source: GOLD1234.exe, 00000025.00000003.3234339463.0000000000F06000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/KCz |
Source: shop.exe, 00000032.00000002.3574945711.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3398055770.0000000001670000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3571302943.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3365556478.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3571302943.00000000015CD000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3161598485.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/api |
Source: shop.exe, 00000032.00000003.3571302943.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000002.3574945711.00000000015F0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/api0-Q |
Source: GOLD1234.exe, 00000025.00000003.3420299008.0000000000F06000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/api: |
Source: GOLD1234.exe, 00000025.00000003.2981305297.0000000000F6B000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3127124077.0000000000F6E000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3098957154.0000000000F6F000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3126824181.0000000000F6B000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3048486160.0000000000F6B000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3226982086.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3147801023.0000000000F6F000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3420863597.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3269711303.0000000000F89000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2993220330.0000000000F6F000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3156872332.0000000000F6F000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3419949484.0000000000F89000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3157231448.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3284579257.000000000165F000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3318306833.0000000001669000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000002.3575346038.0000000001673000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3570754221.0000000001673000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3396975066.0000000001670000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3178681399.000000000165E000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3134934395.0000000001652000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3313436090.000000000165F000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/apiDk |
Source: shop.exe, 00000032.00000003.3237340411.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3365556478.00000000015F0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/apiU- |
Source: GOLD1234.exe, 00000025.00000003.2981305297.0000000000F6B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/apihq |
Source: GOLD1234.exe, 00000025.00000003.3420863597.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3269711303.0000000000F89000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3476176212.0000000000F8B000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3419949484.0000000000F89000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/apila=q |
Source: GOLD1234.exe, 00000025.00000003.3476176212.0000000000F8B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/apilaZq |
Source: GOLD1234.exe, 00000025.00000003.3420299008.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3234339463.0000000000F13000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/apin |
Source: shop.exe, 00000032.00000003.3396975066.0000000001670000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000002.3575305695.0000000001670000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3572763992.0000000001670000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3398055770.0000000001670000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/apiop4 |
Source: shop.exe, 00000032.00000002.3575346038.0000000001673000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3570754221.0000000001673000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3573096106.0000000001673000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/h |
Source: GOLD1234.exe, 00000025.00000003.3098957154.0000000000F6F000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3048486160.0000000000F6B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/mm |
Source: GOLD1234.exe, 00000025.00000003.2971601719.0000000003990000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/o |
Source: shop.exe, 00000032.00000003.3160434239.0000000003B28000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3161659780.0000000003B28000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/rpwls |
Source: shop.exe, 00000032.00000003.3396975066.0000000001670000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3546805059.0000000001673000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3398055770.0000000001670000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/u |
Source: GOLD1234.exe, 00000025.00000003.3420863597.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3269711303.0000000000F89000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3476176212.0000000000F8B000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3419949484.0000000000F89000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site/x |
Source: GOLD1234.exe, 00000025.00000003.3234339463.0000000000F06000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3420299008.0000000000F06000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3134934395.0000000001652000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3396975066.000000000168C000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3237340411.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3137226821.0000000001656000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3397635245.000000000168C000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3161598485.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site:443/api |
Source: GOLD1234.exe, 00000025.00000003.3234339463.0000000000F06000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3420299008.0000000000F06000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site:443/api2o4p.default-release/key4.dbPK |
Source: GOLD1234.exe, 00000025.00000003.3234339463.0000000000F06000.00000004.00000020.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3420299008.0000000000F06000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://goalyfeastz.site:443/apitxtPK |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://help.steampowered.com/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://help.steampowered.com/en/ |
Source: shop.exe, 00000032.00000003.3218081015.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.steampowered.com/ |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://lv.queniujq.cn |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://medal.tv |
Source: c1a4d3220c.exe, 00000021.00000003.3197330580.00000000012E4000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2995423907.00000000012F1000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2894968481.00000000012F5000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2895449754.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3426244522.00000000012E4000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3124289253.00000000012F7000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2999744421.00000000012F5000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2996701233.00000000012F5000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3052777343.00000000012F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/ |
Source: c1a4d3220c.exe, 00000021.00000003.2995423907.00000000012F1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/88 |
Source: c1a4d3220c.exe, 00000021.00000003.2995423907.00000000012F1000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3239817137.0000000001317000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2907838165.00000000012F2000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3125524590.0000000001316000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3124989679.0000000001312000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3261286984.0000000001309000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3426244522.00000000012E4000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2894968481.00000000012EF000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3124289253.00000000012F7000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2924863746.00000000012F2000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3124530510.0000000001309000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3026321552.00000000012EF000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3124800918.000000000130E000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2996701233.00000000012F5000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3147328851.0000000001317000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3052777343.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3099529730.00000000012F5000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/api |
Source: c1a4d3220c.exe, 00000021.00000003.2995423907.00000000012F1000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2996701233.00000000012F5000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/api&O |
Source: c1a4d3220c.exe, 00000021.00000003.3261447035.0000000001304000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3240812796.0000000001304000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/api1 |
Source: c1a4d3220c.exe, 00000021.00000003.3026321552.00000000012EF000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3052777343.00000000012F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/apiA |
Source: c1a4d3220c.exe, 00000021.00000003.3148528207.00000000012E4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/apiL |
Source: c1a4d3220c.exe, 00000021.00000003.3197330580.00000000012E4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/d |
Source: c1a4d3220c.exe, 00000021.00000003.3026321552.00000000012EF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/i |
Source: c1a4d3220c.exe, 00000021.00000003.3099529730.00000000012F5000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store/n |
Source: c1a4d3220c.exe, 00000021.00000003.2907838165.00000000012F2000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2894968481.00000000012EF000.00000004.00000020.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2924863746.00000000012F2000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store:443/api |
Source: c1a4d3220c.exe, 00000021.00000003.2986190918.00000000058FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://necklacedmny.store:443/apij |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://player.vimeo.com |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://recaptcha.net |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://s.ytimg.com; |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://sketchfab.com |
Source: axplong.exe, 00000005.00000003.3273657100.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.2912523697.0000000005F85000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://sosipisos.cc/ |
Source: axplong.exe, 00000005.00000003.3273657100.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000005.00000003.2912523697.0000000005F85000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://sosipisos.cc/G |
Source: axplong.exe, 00000005.00000003.2912523697.0000000005F85000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://sosipisos.cc/shop.exe |
Source: axplong.exe, 00000005.00000003.2912523697.0000000005F85000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://sosipisos.cc/shop.exe6 |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steam.tv/ |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steambroadcast.akamaized.net |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/ |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/- |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/market/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/ |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/; |
Source: new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/about/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/explore/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/legal/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/mobile |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/news/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/stats/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: new_v8.exe, 0000001B.00000003.2729333036.00000000039D3000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2895711976.000000000594E000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2935060816.00000000039E1000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3094923714.0000000003B72000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.microsof |
Source: shop.exe, 00000032.00000003.3207526089.0000000003C35000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: shop.exe, 00000032.00000003.3207526089.0000000003C35000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: stealc_default2.exe, 00000006.00000003.2581126375.0000000027DD7000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp, stealc_default2.exe, 00000006.00000002.2613116477.0000000000F5A000.00000004.00000001.01000000.00000009.sdmp, stealc_default2.exe, 00000006.00000003.2475599150.0000000021A81000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2731706429.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2730636393.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2729333036.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2895711976.000000000594C000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2935060816.00000000039DF000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3098799656.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3094923714.0000000003B70000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp, stealc_default2.exe, 00000006.00000002.2613116477.0000000000F5A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201621kbG1nY |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F5A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV |
Source: new_v8.exe, 0000001B.00000003.2729694255.00000000039A5000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3098799656.0000000003B44000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp, stealc_default2.exe, 00000006.00000003.2475599150.0000000021A81000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2731706429.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2730636393.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2729333036.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2895711976.000000000594C000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2935060816.00000000039DF000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3098799656.0000000003B69000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3094923714.0000000003B70000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: new_v8.exe, 0000001B.00000003.2729694255.00000000039A5000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3098799656.0000000003B44000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17date |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm |
Source: new_v8.exe, 0000001B.00000003.2753208386.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.3586761744.0000000001241000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804141187.0000000003978000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2781723606.0000000003978000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2752826624.0000000003978000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804564424.0000000003978000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/ |
Source: new_v8.exe, 0000001B.00000003.2732256893.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2732759831.000000000123B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/(( |
Source: new_v8.exe, 0000001B.00000003.3586627682.0000000001238000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.3361161851.0000000001238000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/E |
Source: new_v8.exe, 0000001B.00000003.2731444217.0000000001234000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/EZP |
Source: new_v8.exe, 0000001B.00000003.2806388505.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804901138.0000000001234000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/H |
Source: new_v8.exe, 0000001B.00000003.3361161851.0000000001238000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.3013166216.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2912344103.0000000001234000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/M |
Source: new_v8.exe, 0000001B.00000003.3051791237.0000000003986000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804806549.000000000124A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2912107738.0000000001267000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2753208386.000000000124A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2780168317.000000000124A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2912344103.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.3585890980.0000000003986000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.3049757259.0000000001267000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2912258369.000000000123C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/api |
Source: new_v8.exe, 0000001B.00000003.2912258369.000000000123C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/apiE |
Source: new_v8.exe, 0000001B.00000003.2753208386.000000000124A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/apier |
Source: new_v8.exe, 0000001B.00000003.3051791237.0000000003986000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/apihZP |
Source: new_v8.exe, 0000001B.00000003.3051791237.0000000003986000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/apik |
Source: new_v8.exe, 0000001B.00000003.2754649701.000000000124A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2785879104.000000000124A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2753208386.000000000124A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2780168317.000000000124A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/apilXY |
Source: new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/jZP |
Source: new_v8.exe, 0000001B.00000003.2780397423.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2754940849.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2780481802.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2753208386.0000000001234000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/m |
Source: new_v8.exe, 0000001B.00000003.2804141187.0000000003978000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804564424.0000000003978000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/pI |
Source: new_v8.exe, 0000001B.00000003.3013166216.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2912344103.0000000001234000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou/s |
Source: new_v8.exe, 0000001B.00000003.2732256893.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2731444217.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2732759831.000000000123B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou:443/api |
Source: new_v8.exe, 0000001B.00000003.2753208386.000000000124A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://villagedguy.cyou:443/apiwWarningViaUpgradechunkedTransfer-EncodingTrailerno-cachePragmaKeep- |
Source: new_v8.exe |
String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2806388505.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804901138.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2879371414.000000000123A000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3218081015.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: axplong.exe, 00000005.00000003.3271971261.0000000005FB9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.digicert.com/CPS0 |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: new_v8.exe, new_v8.exe, 0000001B.00000003.2806388505.0000000001237000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2804901138.0000000001234000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2879371414.000000000123A000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.expedia.com/?locale=en_US&sitei |
Source: stealc_default2.exe, 00000006.00000002.2615206943.00000000017D1000.00000004.00000020.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3218081015.0000000001655000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219 |
Source: Jurisdiction.pif.10.dr |
String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: splwow64.exe, 00000009.00000003.2554001535.0000000002905000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000013.00000003.2606591118.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, 0b44ippu.exe, 0000002E.00000003.2964754545.00000000027F2000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif.10.dr |
String found in binary or memory: https://www.globalsign.com/repository/06 |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com |
Source: new_v8.exe, 0000001B.00000003.2734376814.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733596178.00000000039BE000.00000004.00000800.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2733888758.00000000039BC000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.2913098718.000000000591F000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2944595083.00000000039CC000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2953869224.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.2949495792.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3106922930.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3105886803.0000000003B5D000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3107663794.0000000003B5B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/recaptcha/ |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://www.mozilla.org/about/ |
Source: shop.exe, 00000032.00000003.3207526089.0000000003C35000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://www.mozilla.org/contribute/ |
Source: shop.exe, 00000032.00000003.3207526089.0000000003C35000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ |
Source: stealc_default2.exe, 00000006.00000003.2581126375.0000000027DD7000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2785326300.0000000003A8F000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3067850619.0000000005C19000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3099294872.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3207526089.0000000003C35000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ZoZ2ZuaGJncGpkZW5qZ21kZ29laWFwcGFmbG58MXwwfDB8SmF4eCBM |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/lvYnwxfDB8MHxMYXN0UGFzc3xoZG9raWVqbnBpbWFrZWRoYWpoZGxj |
Source: shop.exe, 00000032.00000003.3207526089.0000000003C35000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: stealc_default2.exe, 00000006.00000002.2613116477.0000000000F6A000.00000004.00000001.01000000.00000009.sdmp |
String found in binary or memory: https://www.mozilla.org/privacy/firefox/ |
Source: stealc_default2.exe, 00000006.00000003.2581126375.0000000027DD7000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2785326300.0000000003A8F000.00000004.00000800.00020000.00000000.sdmp, c1a4d3220c.exe, 00000021.00000003.3067850619.0000000005C19000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 00000025.00000003.3099294872.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, shop.exe, 00000032.00000003.3207526089.0000000003C35000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: new_v8.exe, 0000001B.00000003.2697182708.0000000001227000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001B.00000003.2713217839.0000000001237000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.youtube.com |
Source: new_v8.exe, 0000001B.00000003.2701683074.00000000011F3000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mstask.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dui70.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: duser.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: chartv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: oleacc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: atlthunk.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.fileexplorer.common.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: explorerframe.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: mozglue.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: msvcp140.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: napinsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: pnrpnsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: wshbth.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: nlaapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Section loaded: winrnr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: riched20.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: usp10.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: msls31.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: ntmarta.dll |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: apphelp.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: wsock32.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: mpr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: wininet.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: ntmarta.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Section loaded: rasadhlp.dll |
|
Source: C:\Windows\SysWOW64\choice.exe |
Section loaded: version.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: taskschd.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Section loaded: xmllite.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: jscript.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: webio.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: wsock32.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: mpr.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: wininet.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: mscoree.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: vcruntime140_clr0400.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: dwrite.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: riched20.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: usp10.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: msls31.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: windowscodecs.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: ntmarta.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: jscript.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: wsock32.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: mpr.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: wininet.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: webio.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: webio.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Section loaded: apphelp.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: apphelp.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: aclayers.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: sfc.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: sfc_os.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: wininet.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: windowscodecs.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: iertutil.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: winhttp.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: mswsock.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: winnsi.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: urlmon.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: netutils.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: shfolder.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: propsys.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: riched20.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: usp10.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: msls31.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: textinputframework.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: coreuicomponents.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: coremessaging.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: ntmarta.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: textshaping.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: edputil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: urlmon.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: iertutil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: srvcli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: netutils.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: windows.staterepositoryps.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: appresolver.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: bcp47langs.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: slc.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: sppc.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: onecorecommonproxystub.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Section loaded: onecoreuapcommonproxystub.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: wininet.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: rstrtmgr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: iertutil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: urlmon.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: srvcli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Section loaded: netutils.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif |
Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr |
Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBAD58 second address: EBAD7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jmp 00007FAF78D3F536h 0x0000000b jng 00007FAF78D3F526h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBAD7E second address: EBAD83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBAF26 second address: EBAF2C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBAF2C second address: EBAF49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jc 00007FAF7914BEC6h 0x0000000d jmp 00007FAF7914BECFh 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD5CB second address: EBD5CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD5CF second address: EBD63F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FAF7914BECFh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FAF7914BED5h 0x00000013 pop edx 0x00000014 nop 0x00000015 sbb esi, 4F1C3EF6h 0x0000001b push 00000000h 0x0000001d push edx 0x0000001e pop esi 0x0000001f call 00007FAF7914BEC9h 0x00000024 push edx 0x00000025 push edx 0x00000026 jmp 00007FAF7914BED8h 0x0000002b pop edx 0x0000002c pop edx 0x0000002d push eax 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 jmp 00007FAF7914BECDh 0x00000036 pop eax 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD63F second address: EBD682 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F537h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007FAF78D3F52Fh 0x00000012 mov eax, dword ptr [eax] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FAF78D3F531h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD7F8 second address: EBD816 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED1h 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD816 second address: EBD81B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD81B second address: EBD820 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD820 second address: EBD826 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD826 second address: EBD86D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jmp 00007FAF7914BED2h 0x00000010 mov eax, dword ptr [eax] 0x00000012 jp 00007FAF7914BED0h 0x00000018 pushad 0x00000019 ja 00007FAF7914BEC6h 0x0000001f push ecx 0x00000020 pop ecx 0x00000021 popad 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FAF7914BED2h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD86D second address: EBD873 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD873 second address: EBD877 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD877 second address: EBD903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push 00000000h 0x0000000b push esi 0x0000000c call 00007FAF78D3F528h 0x00000011 pop esi 0x00000012 mov dword ptr [esp+04h], esi 0x00000016 add dword ptr [esp+04h], 0000001Ch 0x0000001e inc esi 0x0000001f push esi 0x00000020 ret 0x00000021 pop esi 0x00000022 ret 0x00000023 pushad 0x00000024 mov edi, dword ptr [ebp+122D29D1h] 0x0000002a movzx ecx, ax 0x0000002d popad 0x0000002e push 00000003h 0x00000030 mov edx, dword ptr [ebp+122D2925h] 0x00000036 push 00000000h 0x00000038 mov edi, edx 0x0000003a push 00000003h 0x0000003c push 00000000h 0x0000003e push ebx 0x0000003f call 00007FAF78D3F528h 0x00000044 pop ebx 0x00000045 mov dword ptr [esp+04h], ebx 0x00000049 add dword ptr [esp+04h], 00000014h 0x00000051 inc ebx 0x00000052 push ebx 0x00000053 ret 0x00000054 pop ebx 0x00000055 ret 0x00000056 call 00007FAF78D3F529h 0x0000005b jmp 00007FAF78D3F536h 0x00000060 push eax 0x00000061 push eax 0x00000062 push edx 0x00000063 jnl 00007FAF78D3F528h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD903 second address: EBD909 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD909 second address: EBD90D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD90D second address: EBD911 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD911 second address: EBD985 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jmp 00007FAF78D3F52Ah 0x00000011 mov eax, dword ptr [eax] 0x00000013 jmp 00007FAF78D3F534h 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c jmp 00007FAF78D3F52Fh 0x00000021 pop eax 0x00000022 movsx ecx, dx 0x00000025 lea ebx, dword ptr [ebp+12452442h] 0x0000002b call 00007FAF78D3F538h 0x00000030 add dword ptr [ebp+122D1D34h], esi 0x00000036 pop edi 0x00000037 xchg eax, ebx 0x00000038 jp 00007FAF78D3F530h 0x0000003e pushad 0x0000003f pushad 0x00000040 popad 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBD9FF second address: EBDA05 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBDAA1 second address: EBDADD instructions: 0x00000000 rdtsc 0x00000002 js 00007FAF78D3F528h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 5F626312h 0x00000013 jmp 00007FAF78D3F537h 0x00000018 lea ebx, dword ptr [ebp+1245244Dh] 0x0000001e stc 0x0000001f and si, E340h 0x00000024 xchg eax, ebx 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 pop eax 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBDADD second address: EBDAE1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBDAE1 second address: EBDAEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EBDAEB second address: EBDAEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDF514 second address: EDF518 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDD4AC second address: EDD4B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FAF7914BEC6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDD4B7 second address: EDD4BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDD4BD second address: EDD4E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FAF7914BED3h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f jnc 00007FAF7914BEC6h 0x00000015 pop edi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDD4E1 second address: EDD4F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FAF78D3F532h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDD8F2 second address: EDD8F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDD8F6 second address: EDD8FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDE122 second address: EDE12F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FAF7914BEC6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDE3F2 second address: EDE3F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDEEFD second address: EDEF4B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED1h 0x00000007 jmp 00007FAF7914BED9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 jns 00007FAF7914BEC6h 0x00000016 pushad 0x00000017 popad 0x00000018 jmp 00007FAF7914BECBh 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 jng 00007FAF7914BEC6h 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EDF388 second address: EDF393 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FAF78D3F526h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE1624 second address: EE165F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FAF7914BED5h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jl 00007FAF7914BED2h 0x00000013 jmp 00007FAF7914BECCh 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FAF7914BECAh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE165F second address: EE1663 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE2EB7 second address: EE2EBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EE2EBB second address: EE2ECA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jg 00007FAF78D3F526h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA3295 second address: EA329F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA329F second address: EA32A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA32A3 second address: EA32BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED5h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA32BE second address: EA32EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F52Eh 0x00000007 push eax 0x00000008 pushad 0x00000009 popad 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jg 00007FAF78D3F526h 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 jmp 00007FAF78D3F52Ch 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA32EC second address: EA3300 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FAF7914BECDh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FCD7 second address: E9FCDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FCDB second address: E9FCE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FCE1 second address: E9FD0D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F531h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jmp 00007FAF78D3F530h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FD0D second address: E9FD29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED3h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FD29 second address: E9FD33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FAF78D3F526h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FD33 second address: E9FD3F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jg 00007FAF7914BEC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: E9FD3F second address: E9FD4A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 je 00007FAF78D3F526h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEA6C6 second address: EEA6D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007FAF7914BEC6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEA6D3 second address: EEA6D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEA866 second address: EEA89B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FAF7914BED1h 0x0000000a popad 0x0000000b jo 00007FAF7914BEF8h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FAF7914BED6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEA9FE second address: EEAA07 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEAA07 second address: EEAA2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pushad 0x00000008 jng 00007FAF7914BEC6h 0x0000000e pushad 0x0000000f popad 0x00000010 je 00007FAF7914BEC6h 0x00000016 push edx 0x00000017 pop edx 0x00000018 popad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c ja 00007FAF7914BEC8h 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEAB5A second address: EEABA1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jo 00007FAF78D3F526h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FAF78D3F537h 0x00000011 jmp 00007FAF78D3F537h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jng 00007FAF78D3F52Ah 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEAE51 second address: EEAE59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEAE59 second address: EEAE5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEAE5D second address: EEAE63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEAE63 second address: EEAE71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007FAF78D3F526h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEAFC9 second address: EEAFFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b js 00007FAF7914BEC6h 0x00000011 jmp 00007FAF7914BED7h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EECAB7 second address: EECABD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EECABD second address: EECAC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EECAC2 second address: EECAF2 instructions: 0x00000000 rdtsc 0x00000002 js 00007FAF78D3F538h 0x00000008 jmp 00007FAF78D3F52Ch 0x0000000d jl 00007FAF78D3F526h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 jbe 00007FAF78D3F526h 0x0000001e jmp 00007FAF78D3F52Bh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EECAF2 second address: EECAF8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EECAF8 second address: EECB1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FAF78D3F52Dh 0x0000000b pushad 0x0000000c jl 00007FAF78D3F526h 0x00000012 pushad 0x00000013 popad 0x00000014 jne 00007FAF78D3F526h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EB223B second address: EB2265 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 popad 0x00000008 push ecx 0x00000009 jmp 00007FAF7914BED9h 0x0000000e js 00007FAF7914BECCh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED266 second address: EED26B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED26B second address: EED2A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c jng 00007FAF7914BEC6h 0x00000012 pop ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FAF7914BED9h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED3E6 second address: EED3F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push esi 0x0000000e pop esi 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED5B1 second address: EED5B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED838 second address: EED858 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FAF78D3F534h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED858 second address: EED86A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED9D2 second address: EED9D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EED9D6 second address: EED9FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e js 00007FAF7914BEC6h 0x00000014 jmp 00007FAF7914BED4h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEDF61 second address: EEDF7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jne 00007FAF78D3F526h 0x0000000c pop esi 0x0000000d popad 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 jnc 00007FAF78D3F526h 0x00000018 pop edi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEE181 second address: EEE193 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b jng 00007FAF7914BEC6h 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEE193 second address: EEE198 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEE375 second address: EEE37A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEE37A second address: EEE3E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edx 0x0000000b call 00007FAF78D3F528h 0x00000010 pop edx 0x00000011 mov dword ptr [esp+04h], edx 0x00000015 add dword ptr [esp+04h], 00000019h 0x0000001d inc edx 0x0000001e push edx 0x0000001f ret 0x00000020 pop edx 0x00000021 ret 0x00000022 mov si, cx 0x00000025 xchg eax, ebx 0x00000026 jbe 00007FAF78D3F53Ch 0x0000002c pushad 0x0000002d jmp 00007FAF78D3F52Eh 0x00000032 jno 00007FAF78D3F526h 0x00000038 popad 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d jmp 00007FAF78D3F52Ah 0x00000042 jmp 00007FAF78D3F536h 0x00000047 popad 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEF350 second address: EEF354 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEF354 second address: EEF3C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 mov si, dx 0x0000000b push 00000000h 0x0000000d push 00000000h 0x0000000f push esi 0x00000010 call 00007FAF78D3F528h 0x00000015 pop esi 0x00000016 mov dword ptr [esp+04h], esi 0x0000001a add dword ptr [esp+04h], 00000014h 0x00000022 inc esi 0x00000023 push esi 0x00000024 ret 0x00000025 pop esi 0x00000026 ret 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push eax 0x0000002c call 00007FAF78D3F528h 0x00000031 pop eax 0x00000032 mov dword ptr [esp+04h], eax 0x00000036 add dword ptr [esp+04h], 0000001Bh 0x0000003e inc eax 0x0000003f push eax 0x00000040 ret 0x00000041 pop eax 0x00000042 ret 0x00000043 call 00007FAF78D3F52Fh 0x00000048 jbe 00007FAF78D3F526h 0x0000004e pop esi 0x0000004f mov esi, dword ptr [ebp+122D256Ch] 0x00000055 xchg eax, ebx 0x00000056 pushad 0x00000057 pushad 0x00000058 jnp 00007FAF78D3F526h 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EEF3C9 second address: EEF3D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007FAF7914BEC6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF0570 second address: EF0577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF0577 second address: EF05AD instructions: 0x00000000 rdtsc 0x00000002 jl 00007FAF7914BED1h 0x00000008 jmp 00007FAF7914BECBh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f nop 0x00000010 push 00000000h 0x00000012 clc 0x00000013 mov esi, dword ptr [ebp+122D29ADh] 0x00000019 push 00000000h 0x0000001b mov si, D8E6h 0x0000001f mov dword ptr [ebp+122D2465h], edx 0x00000025 xchg eax, ebx 0x00000026 push eax 0x00000027 push edx 0x00000028 jbe 00007FAF7914BEC8h 0x0000002e pushad 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF05AD second address: EF05D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FAF78D3F52Ch 0x00000008 jnc 00007FAF78D3F526h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 ja 00007FAF78D3F526h 0x0000001b pop edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF05D0 second address: EF05DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FAF7914BEC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF05DA second address: EF05DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF1B58 second address: EF1B72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF1B72 second address: EF1BF1 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FAF78D3F52Eh 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push esi 0x00000011 call 00007FAF78D3F528h 0x00000016 pop esi 0x00000017 mov dword ptr [esp+04h], esi 0x0000001b add dword ptr [esp+04h], 0000001Ah 0x00000023 inc esi 0x00000024 push esi 0x00000025 ret 0x00000026 pop esi 0x00000027 ret 0x00000028 clc 0x00000029 mov dword ptr [ebp+122D2F1Ah], eax 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007FAF78D3F528h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 00000016h 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b mov di, 8A55h 0x0000004f jng 00007FAF78D3F528h 0x00000055 mov edi, edx 0x00000057 mov di, BBF0h 0x0000005b push 00000000h 0x0000005d mov esi, dword ptr [ebp+122D3568h] 0x00000063 xchg eax, ebx 0x00000064 push eax 0x00000065 push edx 0x00000066 push esi 0x00000067 push eax 0x00000068 pop eax 0x00000069 pop esi 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF1BF1 second address: EF1C09 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FAF7914BECBh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF1C09 second address: EF1C0F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF328F second address: EF3293 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF3293 second address: EF3299 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF3299 second address: EF32A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FAF7914BEC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF6DEF second address: EF6DF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF6DF3 second address: EF6DF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF6DF7 second address: EF6E49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 nop 0x00000008 jns 00007FAF78D3F53Ch 0x0000000e jnp 00007FAF78D3F536h 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push ecx 0x00000019 call 00007FAF78D3F528h 0x0000001e pop ecx 0x0000001f mov dword ptr [esp+04h], ecx 0x00000023 add dword ptr [esp+04h], 00000017h 0x0000002b inc ecx 0x0000002c push ecx 0x0000002d ret 0x0000002e pop ecx 0x0000002f ret 0x00000030 push 00000000h 0x00000032 add bx, A305h 0x00000037 push eax 0x00000038 push ecx 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c pop eax 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF6E49 second address: EF6E4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF7E04 second address: EF7E17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c ja 00007FAF78D3F526h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF6FAE second address: EF7039 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FAF7914BEC8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d clc 0x0000000e push dword ptr fs:[00000000h] 0x00000015 call 00007FAF7914BED3h 0x0000001a jno 00007FAF7914BEDEh 0x00000020 pop ebx 0x00000021 mov dword ptr fs:[00000000h], esp 0x00000028 push edx 0x00000029 sbb ebx, 4D259897h 0x0000002f pop ebx 0x00000030 mov ebx, dword ptr [ebp+122D29CDh] 0x00000036 mov eax, dword ptr [ebp+122D0F0Dh] 0x0000003c push FFFFFFFFh 0x0000003e sub dword ptr [ebp+122D24C0h], ebx 0x00000044 nop 0x00000045 jmp 00007FAF7914BECFh 0x0000004a push eax 0x0000004b push eax 0x0000004c push edx 0x0000004d jnp 00007FAF7914BECCh 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF7039 second address: EF704B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FAF78D3F52Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF9B99 second address: EF9C36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007FAF7914BEC8h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 0000001Dh 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 movsx edi, ax 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push edi 0x0000002e call 00007FAF7914BEC8h 0x00000033 pop edi 0x00000034 mov dword ptr [esp+04h], edi 0x00000038 add dword ptr [esp+04h], 00000015h 0x00000040 inc edi 0x00000041 push edi 0x00000042 ret 0x00000043 pop edi 0x00000044 ret 0x00000045 mov dword ptr [ebp+122D2370h], ecx 0x0000004b push 00000000h 0x0000004d mov ebx, 7F28D7A1h 0x00000052 sbb edi, 74828020h 0x00000058 xchg eax, esi 0x00000059 jnl 00007FAF7914BEDDh 0x0000005f push esi 0x00000060 jmp 00007FAF7914BED5h 0x00000065 pop esi 0x00000066 push eax 0x00000067 pushad 0x00000068 push eax 0x00000069 push edx 0x0000006a pushad 0x0000006b popad 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF9C36 second address: EF9C40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF9C40 second address: EF9C44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF8E1D second address: EF8E21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF8E21 second address: EF8E25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF8E25 second address: EF8E2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFAB97 second address: EFAB9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFBBE8 second address: EFBBEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFBBEC second address: EFBBFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jc 00007FAF7914BEC6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFAE63 second address: EFAE6D instructions: 0x00000000 rdtsc 0x00000002 jo 00007FAF78D3F52Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFBD13 second address: EFBD2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED7h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFBD2F second address: EFBD4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FAF78D3F538h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F00857 second address: F00861 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F029AE second address: F029C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 js 00007FAF78D3F528h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jnl 00007FAF78D3F528h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFEB18 second address: EFEB22 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FAF7914BEC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F029C7 second address: F029D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FAF78D3F526h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFEB22 second address: EFEB27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F029D1 second address: F02A13 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FAF78D3F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d jmp 00007FAF78D3F539h 0x00000012 push 00000000h 0x00000014 sub dword ptr [ebp+12481856h], ebx 0x0000001a push 00000000h 0x0000001c mov dword ptr [ebp+1247ABA3h], esi 0x00000022 xor bx, 6A62h 0x00000027 xchg eax, esi 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EFEB27 second address: EFEB2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F02A13 second address: F02A19 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F00A86 second address: F00A9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FAF7914BED1h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F02A19 second address: F02A36 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FAF78D3F533h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F02A36 second address: F02A3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F01B7A second address: F01B7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F01B7E second address: F01B84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F05ACE second address: F05AD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F09004 second address: F09011 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FAF7914BEC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1068E second address: F106A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FAF78D3F532h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0FD33 second address: F0FD39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0FD39 second address: F0FD3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0FD3E second address: F0FD44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F0FD44 second address: F0FD59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FAF78D3F52Ch 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F10185 second address: F1018F instructions: 0x00000000 rdtsc 0x00000002 jo 00007FAF7914BECEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1018F second address: F1019D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 jnl 00007FAF78D3F526h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1019D second address: F101A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F159C6 second address: F159CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1AC31 second address: F1AC35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1AC35 second address: F1AC4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F530h 0x00000007 jc 00007FAF78D3F526h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1AC4F second address: F1AC54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1A11E second address: F1A12A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FAF78D3F526h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1A12A second address: F1A12E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1A52F second address: F1A559 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF78D3F52Eh 0x00000009 pop ecx 0x0000000a push edi 0x0000000b push edx 0x0000000c pop edx 0x0000000d pop edi 0x0000000e push eax 0x0000000f pushad 0x00000010 popad 0x00000011 pop eax 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 je 00007FAF78D3F52Ch 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1A559 second address: F1A563 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FAF7914BECCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1A563 second address: F1A56A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1A819 second address: F1A821 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1A821 second address: F1A825 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F206BF second address: F206DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FAF7914BEC6h 0x0000000a pop edx 0x0000000b jmp 00007FAF7914BECAh 0x00000010 jng 00007FAF7914BECEh 0x00000016 push esi 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1FA30 second address: F1FA3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FAF78D3F526h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1FA3B second address: F1FA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FAF7914BED4h 0x0000000b popad 0x0000000c push edx 0x0000000d jnc 00007FAF7914BEC6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1FA5F second address: F1FA76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jnp 00007FAF78D3F53Ah 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 jg 00007FAF78D3F526h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1FA76 second address: F1FA7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F1FBFD second address: F1FC01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9C3B second address: EA9C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9C41 second address: EA9C55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FAF78D3F52Dh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9C55 second address: EA9C59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9C59 second address: EA9C6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF78D3F52Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9C6D second address: EA9C72 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9C72 second address: EA9C78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA9C78 second address: EA9C80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2D7F4 second address: F2D7F9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF4ED0 second address: EF4EDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF4EDA second address: EF4F3F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F537h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jg 00007FAF78D3F52Eh 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007FAF78D3F528h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 00000015h 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c or dword ptr [ebp+122D23EDh], esi 0x00000032 lea eax, dword ptr [ebp+12489C53h] 0x00000038 add di, 7672h 0x0000003d and di, 6AD8h 0x00000042 nop 0x00000043 pushad 0x00000044 push eax 0x00000045 push edx 0x00000046 push eax 0x00000047 push edx 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF4F3F second address: EF4F43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF4F43 second address: EF4F5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007FAF78D3F52Dh 0x0000000c pop esi 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF4F5F second address: EF4F63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5037 second address: EF503B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF503B second address: EF5055 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FAF7914BECDh 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5055 second address: EF5152 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FAF78D3F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jng 00007FAF78D3F533h 0x00000010 jmp 00007FAF78D3F52Dh 0x00000015 popad 0x00000016 xchg eax, ebx 0x00000017 push ecx 0x00000018 jmp 00007FAF78D3F534h 0x0000001d pop edx 0x0000001e push dword ptr fs:[00000000h] 0x00000025 sub dword ptr [ebp+122D2D77h], ebx 0x0000002b mov dword ptr fs:[00000000h], esp 0x00000032 jmp 00007FAF78D3F52Ch 0x00000037 mov dword ptr [ebp+12489CABh], esp 0x0000003d jmp 00007FAF78D3F52Fh 0x00000042 cmp dword ptr [ebp+122D298Dh], 00000000h 0x00000049 jne 00007FAF78D3F629h 0x0000004f push 00000000h 0x00000051 push ebx 0x00000052 call 00007FAF78D3F528h 0x00000057 pop ebx 0x00000058 mov dword ptr [esp+04h], ebx 0x0000005c add dword ptr [esp+04h], 0000001Bh 0x00000064 inc ebx 0x00000065 push ebx 0x00000066 ret 0x00000067 pop ebx 0x00000068 ret 0x00000069 push eax 0x0000006a mov edi, 7032F900h 0x0000006f pop ecx 0x00000070 mov byte ptr [ebp+122D2414h], 00000047h 0x00000077 jp 00007FAF78D3F52Bh 0x0000007d sub di, E5ECh 0x00000082 mov eax, D49AA7D2h 0x00000087 call 00007FAF78D3F52Ah 0x0000008c pop edx 0x0000008d nop 0x0000008e jc 00007FAF78D3F53Eh 0x00000094 jmp 00007FAF78D3F538h 0x00000099 push eax 0x0000009a push eax 0x0000009b push edx 0x0000009c push eax 0x0000009d push edx 0x0000009e jmp 00007FAF78D3F536h 0x000000a3 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5152 second address: EF5158 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF560F second address: EF5614 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5614 second address: EF561A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5812 second address: EF5818 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5818 second address: EF5835 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d push esi 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5A19 second address: EF5A8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FAF78D3F526h 0x0000000a popad 0x0000000b jmp 00007FAF78D3F537h 0x00000010 popad 0x00000011 mov dword ptr [esp], eax 0x00000014 push 00000000h 0x00000016 push ecx 0x00000017 call 00007FAF78D3F528h 0x0000001c pop ecx 0x0000001d mov dword ptr [esp+04h], ecx 0x00000021 add dword ptr [esp+04h], 0000001Bh 0x00000029 inc ecx 0x0000002a push ecx 0x0000002b ret 0x0000002c pop ecx 0x0000002d ret 0x0000002e mov edi, dword ptr [ebp+12453751h] 0x00000034 push 00000004h 0x00000036 mov ecx, dword ptr [ebp+122D224Eh] 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007FAF78D3F539h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5F17 second address: EF5F1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5F1D second address: EF5F23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5F23 second address: EF5F27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF6138 second address: EF61C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F530h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jg 00007FAF78D3F52Ch 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007FAF78D3F528h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b add dword ptr [ebp+122D32D0h], edx 0x00000031 movsx edx, di 0x00000034 lea eax, dword ptr [ebp+12489C97h] 0x0000003a push 00000000h 0x0000003c push eax 0x0000003d call 00007FAF78D3F528h 0x00000042 pop eax 0x00000043 mov dword ptr [esp+04h], eax 0x00000047 add dword ptr [esp+04h], 00000018h 0x0000004f inc eax 0x00000050 push eax 0x00000051 ret 0x00000052 pop eax 0x00000053 ret 0x00000054 jmp 00007FAF78D3F533h 0x00000059 nop 0x0000005a push eax 0x0000005b push edx 0x0000005c jnl 00007FAF78D3F52Ch 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF61C8 second address: EF61CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2CA2A second address: F2CA4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF78D3F52Eh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c jmp 00007FAF78D3F52Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2CA4F second address: F2CA53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2CA53 second address: F2CA57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2CA57 second address: F2CA6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FAF7914BECDh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2CEE3 second address: F2CEE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2CEE7 second address: F2CF1B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED7h 0x00000007 jmp 00007FAF7914BED9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2CF1B second address: F2CF3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FAF78D3F526h 0x00000009 jmp 00007FAF78D3F538h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F2D1F9 second address: F2D22E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007FAF7914BED8h 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FAF7914BED1h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F33497 second address: F3349D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3349D second address: F334B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FAF7914BECEh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F334B0 second address: F334B5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F31FAB second address: F31FAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F31FAF second address: F31FE2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FAF78D3F526h 0x00000008 jne 00007FAF78D3F526h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jmp 00007FAF78D3F52Ah 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FAF78D3F537h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F31FE2 second address: F31FF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECCh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F32424 second address: F3242D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F32563 second address: F32567 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F32567 second address: F3256B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3256B second address: F32571 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F32571 second address: F3257C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3257C second address: F32581 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F32581 second address: F3259D instructions: 0x00000000 rdtsc 0x00000002 jne 00007FAF78D3F52Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FAF78D3F52Ah 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3259D second address: F325AE instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FAF7914BECCh 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F325AE second address: F325B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F32DA4 second address: F32DCC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FAF7914BED4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ja 00007FAF7914BED2h 0x00000011 jbe 00007FAF7914BEC6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F32DCC second address: F32DE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jno 00007FAF78D3F526h 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 jne 00007FAF78D3F526h 0x00000016 pop eax 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3331A second address: F3331E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F31CF2 second address: F31D02 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FAF78D3F526h 0x00000008 jnp 00007FAF78D3F526h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F372BD second address: F372C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F375F9 second address: F375FF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F375FF second address: F37604 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F37604 second address: F3760A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA4CA1 second address: EA4CC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FAF7914BED1h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007FAF7914BEC6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EA4CC4 second address: EA4CC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F39AC3 second address: F39AC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3EB0A second address: F3EB12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3E115 second address: F3E119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3E119 second address: F3E134 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F533h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3E134 second address: F3E138 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3E138 second address: F3E142 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FAF78D3F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F3E68D second address: F3E6CA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007FAF7914BECCh 0x0000000c jbe 00007FAF7914BEC6h 0x00000012 jmp 00007FAF7914BECDh 0x00000017 jmp 00007FAF7914BED3h 0x0000001c popad 0x0000001d pushad 0x0000001e push edx 0x0000001f push edx 0x00000020 pop edx 0x00000021 push ebx 0x00000022 pop ebx 0x00000023 pop edx 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F43F91 second address: F43F97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F43F97 second address: F43F9D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F43F9D second address: F43FAD instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FAF78D3F532h 0x00000008 jns 00007FAF78D3F526h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F44117 second address: F4411C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F44262 second address: F44266 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F44266 second address: F4427A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FAF7914BECEh 0x0000000c jnp 00007FAF7914BEC6h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4427A second address: F44291 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007FAF78D3F531h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F44291 second address: F44295 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F44295 second address: F4429F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5C18 second address: EF5C1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: EF5C1C second address: EF5CB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push ecx 0x00000009 je 00007FAF78D3F528h 0x0000000f pushad 0x00000010 popad 0x00000011 pop ecx 0x00000012 nop 0x00000013 call 00007FAF78D3F52Dh 0x00000018 mov di, F4AFh 0x0000001c pop ecx 0x0000001d mov ebx, dword ptr [ebp+12489C92h] 0x00000023 push 00000000h 0x00000025 push edi 0x00000026 call 00007FAF78D3F528h 0x0000002b pop edi 0x0000002c mov dword ptr [esp+04h], edi 0x00000030 add dword ptr [esp+04h], 00000017h 0x00000038 inc edi 0x00000039 push edi 0x0000003a ret 0x0000003b pop edi 0x0000003c ret 0x0000003d add eax, ebx 0x0000003f push 00000000h 0x00000041 push ecx 0x00000042 call 00007FAF78D3F528h 0x00000047 pop ecx 0x00000048 mov dword ptr [esp+04h], ecx 0x0000004c add dword ptr [esp+04h], 0000001Ah 0x00000054 inc ecx 0x00000055 push ecx 0x00000056 ret 0x00000057 pop ecx 0x00000058 ret 0x00000059 nop 0x0000005a jmp 00007FAF78D3F536h 0x0000005f push eax 0x00000060 je 00007FAF78D3F534h 0x00000066 pushad 0x00000067 jnp 00007FAF78D3F526h 0x0000006d push eax 0x0000006e push edx 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4804C second address: F48068 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FAF7914BEC6h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FAF7914BECCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F481E8 second address: F48200 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnl 00007FAF78D3F526h 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jnp 00007FAF78D3F526h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4F2F0 second address: F4F2F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4F2F4 second address: F4F2FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4F460 second address: F4F464 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F4F464 second address: F4F468 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F5054B second address: F50551 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F50AEF second address: F50AF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F59BE9 second address: F59BED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F58DA1 second address: F58DB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF78D3F52Eh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F591F9 second address: F591FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F591FD second address: F59209 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FAF78D3F526h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F598FC second address: F59900 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F59900 second address: F5990A instructions: 0x00000000 rdtsc 0x00000002 jns 00007FAF78D3F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F5990A second address: F5990F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61C76 second address: F61C7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61C7C second address: F61C86 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FAF7914BEC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61C86 second address: F61C8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61C8B second address: F61CA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FAF7914BECCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61CA4 second address: F61CA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F603C9 second address: F603D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F60544 second address: F6055E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF78D3F534h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6055E second address: F60563 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F60563 second address: F6056B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6056B second address: F6056F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6056F second address: F60573 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F60929 second address: F6092D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6092D second address: F60933 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F60BFD second address: F60C28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jmp 00007FAF7914BED8h 0x0000000b jno 00007FAF7914BEC6h 0x00000011 pop eax 0x00000012 pop edi 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F60C28 second address: F60C37 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61340 second address: F61344 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61344 second address: F61357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pushad 0x0000000a popad 0x0000000b jg 00007FAF78D3F526h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61357 second address: F6135C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6135C second address: F61363 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F61363 second address: F61381 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED6h 0x00000009 popad 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F5F9BA second address: F5F9C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F696F0 second address: F696F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F696F4 second address: F696F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F696F8 second address: F6971B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FAF7914BEC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f pop edx 0x00000010 pushad 0x00000011 jl 00007FAF7914BEC6h 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 pushad 0x0000001a popad 0x0000001b push edx 0x0000001c pop edx 0x0000001d popad 0x0000001e popad 0x0000001f pushad 0x00000020 push edi 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6971B second address: F69724 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F69724 second address: F6972A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6972A second address: F6972E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F69266 second address: F692BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED0h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c jmp 00007FAF7914BECDh 0x00000011 push edi 0x00000012 jmp 00007FAF7914BED9h 0x00000017 pop edi 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b jne 00007FAF7914BED6h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F692BE second address: F692CA instructions: 0x00000000 rdtsc 0x00000002 je 00007FAF78D3F52Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F693F7 second address: F69400 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F69400 second address: F69428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF78D3F539h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F69428 second address: F69444 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F69444 second address: F6945D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FAF78D3F531h 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F6945D second address: F69461 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F8BB39 second address: F8BB3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F8BB3F second address: F8BB43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F8BB43 second address: F8BB8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F531h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jno 00007FAF78D3F540h 0x0000000f jnp 00007FAF78D3F52Eh 0x00000015 pushad 0x00000016 push edi 0x00000017 pop edi 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F8E02E second address: F8E064 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FAF7914BED0h 0x0000000e push eax 0x0000000f push edx 0x00000010 jbe 00007FAF7914BEC6h 0x00000016 jp 00007FAF7914BEC6h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F95D3D second address: F95D43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F95D43 second address: F95D48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F945A1 second address: F945BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jl 00007FAF78D3F526h 0x0000000c jmp 00007FAF78D3F52Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F945BB second address: F945D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED4h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F945D5 second address: F945DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F945DD second address: F945F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F9475C second address: F94760 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F95083 second address: F9509F instructions: 0x00000000 rdtsc 0x00000002 jns 00007FAF7914BECCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007FAF7914BEE6h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F9AAD4 second address: F9AAE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FAF78D3F526h 0x0000000a pop edx 0x0000000b push ebx 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F9AAE3 second address: F9AB0A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECCh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FAF7914BECAh 0x0000000e jmp 00007FAF7914BECDh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAB49B second address: FAB4AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop eax 0x00000007 pushad 0x00000008 jbe 00007FAF78D3F526h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAB4AB second address: FAB4C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED4h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAB4C4 second address: FAB4C9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAB4C9 second address: FAB4E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c jmp 00007FAF7914BECBh 0x00000011 pop ebx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAB4E4 second address: FAB4EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAB4EA second address: FAB503 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED4h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FA8A2B second address: FA8A37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FAF78D3F526h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FA8A37 second address: FA8A3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FA8A3B second address: FA8A3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB8053 second address: FB8059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB7EC7 second address: FB7ECB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBA8DD second address: FBA944 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push esi 0x0000000b pop esi 0x0000000c pushad 0x0000000d popad 0x0000000e push esi 0x0000000f pop esi 0x00000010 push edx 0x00000011 pop edx 0x00000012 popad 0x00000013 pushad 0x00000014 jmp 00007FAF7914BED4h 0x00000019 jc 00007FAF7914BEC6h 0x0000001f push eax 0x00000020 pop eax 0x00000021 popad 0x00000022 pushad 0x00000023 jmp 00007FAF7914BECAh 0x00000028 jmp 00007FAF7914BECEh 0x0000002d jnl 00007FAF7914BEC6h 0x00000033 popad 0x00000034 popad 0x00000035 push esi 0x00000036 push esi 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBA780 second address: FBA78B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBA78B second address: FBA78F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBD805 second address: FBD819 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FAF78D3F526h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jc 00007FAF78D3F528h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBD37A second address: FBD385 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jl 00007FAF7914BEC6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBD385 second address: FBD38E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBD38E second address: FBD3BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jno 00007FAF7914BEC6h 0x00000015 jnl 00007FAF7914BEC6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBD3BC second address: FBD3DC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FAF78D3F536h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBD3DC second address: FBD3E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBD3E0 second address: FBD3E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FBFD44 second address: FBFD50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jne 00007FAF7914BEC6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD848A second address: FD8494 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FAF78D3F526h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD72A2 second address: FD72A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD72A6 second address: FD72AC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD72AC second address: FD72B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD740F second address: FD7414 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD76A8 second address: FD76AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD76AE second address: FD76BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push edi 0x00000007 pop edi 0x00000008 pushad 0x00000009 popad 0x0000000a pop esi 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7828 second address: FD782C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD782C second address: FD7839 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7839 second address: FD7848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 jg 00007FAF7914BECCh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7848 second address: FD7857 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007FAF78D3F52Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7857 second address: FD785B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD785B second address: FD786D instructions: 0x00000000 rdtsc 0x00000002 jc 00007FAF78D3F52Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD786D second address: FD7873 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7AFC second address: FD7B00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7B00 second address: FD7B20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007FAF7914BECEh 0x0000000c jmp 00007FAF7914BECAh 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7B20 second address: FD7B25 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7B25 second address: FD7B41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7CE2 second address: FD7CE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7CE8 second address: FD7D2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED8h 0x00000009 popad 0x0000000a jmp 00007FAF7914BECDh 0x0000000f jnc 00007FAF7914BED2h 0x00000015 js 00007FAF7914BECEh 0x0000001b push esi 0x0000001c pop esi 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7D2E second address: FD7D4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007FAF78D3F53Fh 0x0000000b jmp 00007FAF78D3F52Fh 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7E96 second address: FD7EA2 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FAF7914BEC6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD7EA2 second address: FD7EC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 jnp 00007FAF78D3F526h 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebx 0x0000000f pushad 0x00000010 jmp 00007FAF78D3F52Dh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FDAE09 second address: FDAE13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FAF7914BEC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FDAEB7 second address: FDAEBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FDC6BC second address: FDC6D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FDC6D5 second address: FDC6E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F52Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FDC6E7 second address: FDC6FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FDFFCE second address: FDFFD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B101A4 second address: 4B101CC instructions: 0x00000000 rdtsc 0x00000002 call 00007FAF7914BED2h 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FAF7914BECDh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B101CC second address: 4B101D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B101D2 second address: 4B101D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B00008 second address: 4B0000C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B0000C second address: 4B00027 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B00027 second address: 4B0004B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F539h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B0004B second address: 4B0004F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B0004F second address: 4B00053 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B00053 second address: 4B00059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B00059 second address: 4B0005F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B0005F second address: 4B00063 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B00063 second address: 4B00067 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B40039 second address: 4B4003D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B4003D second address: 4B40050 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F52Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B40050 second address: 4B400C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF7914BECFh 0x00000009 and eax, 0E6EDE4Eh 0x0000000f jmp 00007FAF7914BED9h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007FAF7914BED0h 0x0000001b add si, AAC8h 0x00000020 jmp 00007FAF7914BECBh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 mov ebp, esp 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FAF7914BED5h 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD00DE second address: 4AD012A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F531h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b movsx edx, cx 0x0000000e mov eax, 081F33BFh 0x00000013 popad 0x00000014 xchg eax, ebp 0x00000015 pushad 0x00000016 mov ebx, ecx 0x00000018 pushfd 0x00000019 jmp 00007FAF78D3F52Ch 0x0000001e adc ecx, 73E5DAA8h 0x00000024 jmp 00007FAF78D3F52Bh 0x00000029 popfd 0x0000002a popad 0x0000002b mov ebp, esp 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD012A second address: 4AD012E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD012E second address: 4AD0134 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0134 second address: 4AD017D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF7914BED8h 0x00000009 add ecx, 06088838h 0x0000000f jmp 00007FAF7914BECBh 0x00000014 popfd 0x00000015 push eax 0x00000016 pop edx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push dword ptr [ebp+04h] 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FAF7914BED1h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD017D second address: 4AD0183 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0183 second address: 4AD0187 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0187 second address: 4AD018B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF0CBF second address: 4AF0CEF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov edx, eax 0x0000000d mov ch, DEh 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FAF7914BED1h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF0CEF second address: 4AF0D64 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop esi 0x00000005 pushfd 0x00000006 jmp 00007FAF78D3F533h 0x0000000b and esi, 714FFB5Eh 0x00000011 jmp 00007FAF78D3F539h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FAF78D3F533h 0x00000024 add ecx, 70AC956Eh 0x0000002a jmp 00007FAF78D3F539h 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF079B second address: 4AF07A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF07A1 second address: 4AF07E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F532h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FAF78D3F52Dh 0x00000015 add cx, 9816h 0x0000001a jmp 00007FAF78D3F531h 0x0000001f popfd 0x00000020 mov cx, 2287h 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF07E7 second address: 4AF07ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF07ED second address: 4AF07F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF07F1 second address: 4AF07F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF07F5 second address: 4AF082D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b call 00007FAF78D3F531h 0x00000010 pop edx 0x00000011 mov edi, esi 0x00000013 popad 0x00000014 pop ebp 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FAF78D3F535h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF0531 second address: 4AF056D instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushfd 0x00000008 jmp 00007FAF7914BED5h 0x0000000d or si, F366h 0x00000012 jmp 00007FAF7914BED1h 0x00000017 popfd 0x00000018 popad 0x00000019 xchg eax, ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF056D second address: 4AF0571 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF0571 second address: 4AF0577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF0577 second address: 4AF05DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FAF78D3F52Ah 0x0000000e xchg eax, ebp 0x0000000f jmp 00007FAF78D3F530h 0x00000014 mov ebp, esp 0x00000016 jmp 00007FAF78D3F530h 0x0000001b pop ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007FAF78D3F52Dh 0x00000025 adc ah, FFFFFF86h 0x00000028 jmp 00007FAF78D3F531h 0x0000002d popfd 0x0000002e mov ecx, 0AD05937h 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B003F9 second address: 4B0043D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop esi 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007FAF7914BED4h 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 call 00007FAF7914BECDh 0x00000019 pop eax 0x0000001a call 00007FAF7914BED1h 0x0000001f pop esi 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B0043D second address: 4B00443 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B00443 second address: 4B00447 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B105B1 second address: 4B105B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B105B5 second address: 4B105BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B105BB second address: 4B105C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B105C1 second address: 4B105C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B105C5 second address: 4B105F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FAF78D3F52Dh 0x0000000e mov ebp, esp 0x00000010 jmp 00007FAF78D3F52Eh 0x00000015 mov eax, dword ptr [ebp+08h] 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b movsx edi, cx 0x0000001e mov si, F555h 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF071C second address: 4AF0736 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov ecx, ebx 0x00000010 movsx ebx, ax 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B100C7 second address: 4B100D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, bx 0x00000006 mov ax, di 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B100D9 second address: 4B100F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF7914BED9h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B100F7 second address: 4B10102 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 xchg eax, ebp 0x00000007 pushad 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B10102 second address: 4B10149 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push ebx 0x00000006 pushfd 0x00000007 jmp 00007FAF7914BECAh 0x0000000c and ecx, 237E1758h 0x00000012 jmp 00007FAF7914BECBh 0x00000017 popfd 0x00000018 pop ecx 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f mov ah, A6h 0x00000021 pushfd 0x00000022 jmp 00007FAF7914BECDh 0x00000027 jmp 00007FAF7914BECBh 0x0000002c popfd 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B1036B second address: 4B10424 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov edi, eax 0x00000008 popad 0x00000009 mov dword ptr [esp], ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FAF78D3F52Ch 0x00000013 add eax, 07513D58h 0x00000019 jmp 00007FAF78D3F52Bh 0x0000001e popfd 0x0000001f mov si, E20Fh 0x00000023 popad 0x00000024 mov ebp, esp 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007FAF78D3F530h 0x0000002d xor ax, 47B8h 0x00000032 jmp 00007FAF78D3F52Bh 0x00000037 popfd 0x00000038 mov edi, esi 0x0000003a popad 0x0000003b pop ebp 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f pushfd 0x00000040 jmp 00007FAF78D3F537h 0x00000045 sbb ecx, 5470662Eh 0x0000004b jmp 00007FAF78D3F539h 0x00000050 popfd 0x00000051 pushfd 0x00000052 jmp 00007FAF78D3F530h 0x00000057 sub ecx, 3379E3A8h 0x0000005d jmp 00007FAF78D3F52Bh 0x00000062 popfd 0x00000063 popad 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B10424 second address: 4B1042A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B1042A second address: 4B1042E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B1042E second address: 4B10432 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B306F9 second address: 4B3071E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F531h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FAF78D3F52Dh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B3071E second address: 4B3072E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FAF7914BECCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B3072E second address: 4B30745 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F52Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30745 second address: 4B3074C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ebx, esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B3074C second address: 4B307FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF78D3F533h 0x00000009 and cx, 29DEh 0x0000000e jmp 00007FAF78D3F539h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FAF78D3F530h 0x0000001a sbb ecx, 24B8E1D8h 0x00000020 jmp 00007FAF78D3F52Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 xchg eax, ecx 0x0000002a jmp 00007FAF78D3F536h 0x0000002f mov eax, dword ptr [76FB65FCh] 0x00000034 jmp 00007FAF78D3F530h 0x00000039 test eax, eax 0x0000003b jmp 00007FAF78D3F530h 0x00000040 je 00007FAFEB1426A6h 0x00000046 push eax 0x00000047 push edx 0x00000048 push eax 0x00000049 push edx 0x0000004a jmp 00007FAF78D3F52Ah 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B307FA second address: 4B307FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B307FE second address: 4B30804 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30804 second address: 4B30831 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ecx, eax 0x0000000b jmp 00007FAF7914BED0h 0x00000010 xor eax, dword ptr [ebp+08h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30831 second address: 4B30835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30835 second address: 4B30839 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30839 second address: 4B3083F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B3083F second address: 4B3086A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and ecx, 1Fh 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FAF7914BECDh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B3086A second address: 4B308DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F531h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 ror eax, cl 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FAF78D3F52Ch 0x00000012 adc al, 00000018h 0x00000015 jmp 00007FAF78D3F52Bh 0x0000001a popfd 0x0000001b mov ax, BBCFh 0x0000001f popad 0x00000020 leave 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007FAF78D3F530h 0x00000028 sbb cl, 00000078h 0x0000002b jmp 00007FAF78D3F52Bh 0x00000030 popfd 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FAF78D3F536h 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B308DD second address: 4B30903 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 retn 0004h 0x0000000a nop 0x0000000b mov esi, eax 0x0000000d lea eax, dword ptr [ebp-08h] 0x00000010 xor esi, dword ptr [00D32014h] 0x00000016 push eax 0x00000017 push eax 0x00000018 push eax 0x00000019 lea eax, dword ptr [ebp-10h] 0x0000001c push eax 0x0000001d call 00007FAF7CF8C7BDh 0x00000022 push FFFFFFFEh 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FAF7914BED6h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30903 second address: 4B30909 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30909 second address: 4B30942 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF7914BECCh 0x00000009 adc eax, 457AE668h 0x0000000f jmp 00007FAF7914BECBh 0x00000014 popfd 0x00000015 movzx esi, bx 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pop eax 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FAF7914BECEh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30942 second address: 4B30948 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30948 second address: 4B30984 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ret 0x0000000c nop 0x0000000d push eax 0x0000000e call 00007FAF7CF8C82Bh 0x00000013 mov edi, edi 0x00000015 pushad 0x00000016 mov eax, 23B33ED3h 0x0000001b mov di, si 0x0000001e popad 0x0000001f xchg eax, ebp 0x00000020 jmp 00007FAF7914BED2h 0x00000025 push eax 0x00000026 pushad 0x00000027 push eax 0x00000028 push edx 0x00000029 mov edx, 2FFD2822h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B30984 second address: 4B309AF instructions: 0x00000000 rdtsc 0x00000002 mov bh, A4h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 pushad 0x00000009 mov cx, di 0x0000000c call 00007FAF78D3F533h 0x00000011 pushad 0x00000012 popad 0x00000013 pop ecx 0x00000014 popad 0x00000015 mov ebp, esp 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B309AF second address: 4B309B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B309B5 second address: 4B309BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B309BB second address: 4B309E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FAF7914BED5h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE001F second address: 4AE0025 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0025 second address: 4AE005B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FAF7914BECBh 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FAF7914BED5h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE005B second address: 4AE0078 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F531h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0078 second address: 4AE008B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE008B second address: 4AE010C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FAF78D3F52Fh 0x00000008 pushfd 0x00000009 jmp 00007FAF78D3F538h 0x0000000e adc esi, 2D4BD7F8h 0x00000014 jmp 00007FAF78D3F52Bh 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d and esp, FFFFFFF8h 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 mov ecx, ebx 0x00000025 pushfd 0x00000026 jmp 00007FAF78D3F537h 0x0000002b adc eax, 02B8386Eh 0x00000031 jmp 00007FAF78D3F539h 0x00000036 popfd 0x00000037 popad 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE010C second address: 4AE0184 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b mov ebx, eax 0x0000000d mov ah, EFh 0x0000000f popad 0x00000010 push eax 0x00000011 jmp 00007FAF7914BED2h 0x00000016 xchg eax, ecx 0x00000017 pushad 0x00000018 pushfd 0x00000019 jmp 00007FAF7914BECEh 0x0000001e sub si, 6178h 0x00000023 jmp 00007FAF7914BECBh 0x00000028 popfd 0x00000029 mov ecx, 0971A0AFh 0x0000002e popad 0x0000002f xchg eax, ebx 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 jmp 00007FAF7914BED7h 0x00000038 mov esi, 6B6D228Fh 0x0000003d popad 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0184 second address: 4AE0198 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FAF78D3F530h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0198 second address: 4AE01C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FAF7914BED4h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE01C0 second address: 4AE01C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE01C6 second address: 4AE01CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE01CA second address: 4AE01FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FAF78D3F532h 0x00000012 or ecx, 5765EAF8h 0x00000018 jmp 00007FAF78D3F52Bh 0x0000001d popfd 0x0000001e movzx eax, bx 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE01FF second address: 4AE029D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [ebp+10h] 0x0000000c pushad 0x0000000d movzx esi, bx 0x00000010 mov eax, edx 0x00000012 popad 0x00000013 push eax 0x00000014 jmp 00007FAF7914BED2h 0x00000019 mov dword ptr [esp], esi 0x0000001c pushad 0x0000001d mov esi, 1BB055CDh 0x00000022 pushfd 0x00000023 jmp 00007FAF7914BECAh 0x00000028 add cx, 16E8h 0x0000002d jmp 00007FAF7914BECBh 0x00000032 popfd 0x00000033 popad 0x00000034 mov esi, dword ptr [ebp+08h] 0x00000037 jmp 00007FAF7914BED6h 0x0000003c xchg eax, edi 0x0000003d push eax 0x0000003e push edx 0x0000003f pushad 0x00000040 pushfd 0x00000041 jmp 00007FAF7914BECDh 0x00000046 adc cx, 0BB6h 0x0000004b jmp 00007FAF7914BED1h 0x00000050 popfd 0x00000051 mov bl, al 0x00000053 popad 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE029D second address: 4AE02E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F52Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FAF78D3F52Bh 0x0000000f xchg eax, edi 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FAF78D3F534h 0x00000017 sub si, 5938h 0x0000001c jmp 00007FAF78D3F52Bh 0x00000021 popfd 0x00000022 pushad 0x00000023 push esi 0x00000024 pop ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE02E4 second address: 4AE031A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 test esi, esi 0x00000008 jmp 00007FAF7914BECEh 0x0000000d je 00007FAFEB59A1E1h 0x00000013 pushad 0x00000014 mov si, C22Dh 0x00000018 mov ch, 54h 0x0000001a popad 0x0000001b cmp dword ptr [esi+08h], DDEEDDEEh 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 mov ax, 909Dh 0x00000029 mov dx, si 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE031A second address: 4AE037C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF78D3F535h 0x00000009 xor eax, 5AC393E6h 0x0000000f jmp 00007FAF78D3F531h 0x00000014 popfd 0x00000015 mov edi, eax 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a je 00007FAFEB18D801h 0x00000020 jmp 00007FAF78D3F52Ah 0x00000025 mov edx, dword ptr [esi+44h] 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FAF78D3F537h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE037C second address: 4AE03F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 or edx, dword ptr [ebp+0Ch] 0x0000000c jmp 00007FAF7914BECEh 0x00000011 test edx, 61000000h 0x00000017 jmp 00007FAF7914BED0h 0x0000001c jne 00007FAFEB59A18Eh 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007FAF7914BECDh 0x0000002b sub si, 5966h 0x00000030 jmp 00007FAF7914BED1h 0x00000035 popfd 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE03F0 second address: 4AE03F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE03F5 second address: 4AE042C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF7914BECDh 0x00000009 adc cx, 82C6h 0x0000000e jmp 00007FAF7914BED1h 0x00000013 popfd 0x00000014 mov bl, al 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 test byte ptr [esi+48h], 00000001h 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE042C second address: 4AE0432 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0432 second address: 4AE047F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FAFEB59A11Ah 0x0000000f jmp 00007FAF7914BED6h 0x00000014 test bl, 00000007h 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a jmp 00007FAF7914BECDh 0x0000001f mov ch, 6Ch 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0721 second address: 4AD0789 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F539h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007FAF78D3F537h 0x00000010 push esi 0x00000011 mov edi, 1C602FAAh 0x00000016 pop edi 0x00000017 popad 0x00000018 xchg eax, ebp 0x00000019 jmp 00007FAF78D3F52Eh 0x0000001e mov ebp, esp 0x00000020 jmp 00007FAF78D3F530h 0x00000025 and esp, FFFFFFF8h 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0789 second address: 4AD078D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD078D second address: 4AD0791 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0791 second address: 4AD0797 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0797 second address: 4AD07B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F534h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a pushad 0x0000000b push eax 0x0000000c mov eax, ebx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD07B9 second address: 4AD07BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD07BD second address: 4AD07FE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F532h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007FAF78D3F52Bh 0x00000010 xchg eax, ebx 0x00000011 jmp 00007FAF78D3F536h 0x00000016 xchg eax, esi 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD07FE second address: 4AD0802 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0802 second address: 4AD0806 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0806 second address: 4AD080C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD080C second address: 4AD081B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FAF78D3F52Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD081B second address: 4AD087E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FAF7914BED1h 0x00000011 xchg eax, esi 0x00000012 jmp 00007FAF7914BECEh 0x00000017 mov esi, dword ptr [ebp+08h] 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d push edi 0x0000001e pop eax 0x0000001f call 00007FAF7914BED9h 0x00000024 pop eax 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD087E second address: 4AD08E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, B623h 0x00000007 pushfd 0x00000008 jmp 00007FAF78D3F538h 0x0000000d adc si, 6168h 0x00000012 jmp 00007FAF78D3F52Bh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b sub ebx, ebx 0x0000001d pushad 0x0000001e mov cx, di 0x00000021 call 00007FAF78D3F531h 0x00000026 push eax 0x00000027 pop ebx 0x00000028 pop eax 0x00000029 popad 0x0000002a test esi, esi 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f movzx eax, dx 0x00000032 call 00007FAF78D3F531h 0x00000037 pop ecx 0x00000038 popad 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD08E8 second address: 4AD0985 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FAF7914BECCh 0x00000008 pop esi 0x00000009 jmp 00007FAF7914BECBh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 je 00007FAFEB5A194Eh 0x00000017 pushad 0x00000018 mov bh, cl 0x0000001a pushfd 0x0000001b jmp 00007FAF7914BED1h 0x00000020 sbb eax, 79114CF6h 0x00000026 jmp 00007FAF7914BED1h 0x0000002b popfd 0x0000002c popad 0x0000002d cmp dword ptr [esi+08h], DDEEDDEEh 0x00000034 jmp 00007FAF7914BECEh 0x00000039 mov ecx, esi 0x0000003b jmp 00007FAF7914BED0h 0x00000040 je 00007FAFEB5A1908h 0x00000046 jmp 00007FAF7914BED0h 0x0000004b test byte ptr [76FB6968h], 00000002h 0x00000052 push eax 0x00000053 push edx 0x00000054 pushad 0x00000055 mov dx, cx 0x00000058 popad 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0985 second address: 4AD09B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F535h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FAFEB194F3Eh 0x0000000f pushad 0x00000010 push esi 0x00000011 pop edi 0x00000012 mov si, 1BABh 0x00000016 popad 0x00000017 mov edx, dword ptr [ebp+0Ch] 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov bh, 0Dh 0x0000001f mov dl, ch 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD09B7 second address: 4AD0A14 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF7914BECCh 0x00000009 or ah, 00000068h 0x0000000c jmp 00007FAF7914BECBh 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007FAF7914BED8h 0x00000018 adc si, 06C8h 0x0000001d jmp 00007FAF7914BECBh 0x00000022 popfd 0x00000023 popad 0x00000024 pop edx 0x00000025 pop eax 0x00000026 xchg eax, ebx 0x00000027 pushad 0x00000028 pushad 0x00000029 mov ecx, ebx 0x0000002b popad 0x0000002c mov bx, C810h 0x00000030 popad 0x00000031 push eax 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0A14 second address: 4AD0A2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FAF78D3F531h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0A2A second address: 4AD0A6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edx 0x00000005 pushfd 0x00000006 jmp 00007FAF7914BED3h 0x0000000b add eax, 72BCC31Eh 0x00000011 jmp 00007FAF7914BED9h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0A6D second address: 4AD0A71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0A71 second address: 4AD0A84 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0A84 second address: 4AD0A9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FAF78D3F534h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0B30 second address: 4AD0B36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0B36 second address: 4AD0B3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AD0B3A second address: 4AD0B3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0E7D second address: 4AE0E81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0E81 second address: 4AE0E87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0E87 second address: 4AE0EB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F52Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FAF78D3F537h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0EB3 second address: 4AE0EB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0EB9 second address: 4AE0ED1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FAF78D3F52Dh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0ED1 second address: 4AE0F26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FAF7914BED7h 0x00000009 or ecx, 1FC8E6EEh 0x0000000f jmp 00007FAF7914BED9h 0x00000014 popfd 0x00000015 mov eax, 69CEB277h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d xchg eax, ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov ecx, ebx 0x00000023 jmp 00007FAF7914BECBh 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0F26 second address: 4AE0F2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0F2C second address: 4AE0F30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0F30 second address: 4AE0F58 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007FAF78D3F537h 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0F58 second address: 4AE0F5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0F5C second address: 4AE0F77 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F537h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0B87 second address: 4AE0B8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0B8B second address: 4AE0B8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0B8F second address: 4AE0B95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0B95 second address: 4AE0BB4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F534h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov dh, 30h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0BB4 second address: 4AE0BD7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, A786h 0x00000007 mov eax, edi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FAF7914BED4h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AE0BD7 second address: 4AE0C0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 push ecx 0x00000007 pop edx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e push ecx 0x0000000f push edx 0x00000010 pop eax 0x00000011 pop edi 0x00000012 call 00007FAF78D3F52Ah 0x00000017 pop edx 0x00000018 popad 0x00000019 pop ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FAF78D3F533h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B60637 second address: 4B6063C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B6063C second address: 4B60665 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F534h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FAF78D3F52Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B60665 second address: 4B6066B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50931 second address: 4B5094D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF78D3F52Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov dx, FB16h 0x00000011 mov bx, B2A2h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B5094D second address: 4B50972 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BED8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov eax, edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50972 second address: 4B50977 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50977 second address: 4B5098B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, cx 0x00000006 mov si, 65BDh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov ch, 68h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50772 second address: 4B50776 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50776 second address: 4B5077C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B5077C second address: 4B50782 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50782 second address: 4B50786 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF0317 second address: 4AF0349 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 0B6FFA8Bh 0x00000008 pushfd 0x00000009 jmp 00007FAF78D3F530h 0x0000000e add al, FFFFFF98h 0x00000011 jmp 00007FAF78D3F52Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4AF0349 second address: 4AF035B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAF7914BECEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50B55 second address: 4B50BB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, ebx 0x00000005 pushfd 0x00000006 jmp 00007FAF78D3F52Bh 0x0000000b jmp 00007FAF78D3F533h 0x00000010 popfd 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 xchg eax, ebp 0x00000015 pushad 0x00000016 mov ax, 65DBh 0x0000001a mov cx, 84B7h 0x0000001e popad 0x0000001f push eax 0x00000020 jmp 00007FAF78D3F52Dh 0x00000025 xchg eax, ebp 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 mov al, dh 0x0000002b jmp 00007FAF78D3F534h 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50BB1 second address: 4B50BCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 07F366B4h 0x00000008 mov bx, 3A20h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 mov al, 1Dh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50BCA second address: 4B50BD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50C31 second address: 4B50C37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50C37 second address: 4B50C3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 4B50C3B second address: 4B50C3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001172001\Set-up.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001172001\Set-up.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001507001\1bd0484d71.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1001507001\1bd0484d71.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe |
Queries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Queries volume information: C:\ VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Queries volume information: C:\ VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Queries volume information: C:\ VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe |
Queries volume information: C:\ VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Queries volume information: C:\ VolumeInformation |
|
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NWTVCDUMOB |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\ONBQCLYSPU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NWTVCDUMOB |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\ONBQCLYSPU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VLZDGUKUTZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NWTVCDUMOB |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\ONBQCLYSPU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VLZDGUKUTZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NWTVCDUMOB |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\ONBQCLYSPU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VLZDGUKUTZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NWTVCDUMOB |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VLZDGUKUTZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NWTVCDUMOB |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\ONBQCLYSPU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\ONBQCLYSPU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VLZDGUKUTZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VLZDGUKUTZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\NWTVCDUMOB |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\ONBQCLYSPU |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VAMYDFPUND |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents\VLZDGUKUTZ |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe |
Directory queried: C:\Users\user\Documents\RAYHIWGKDI |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\KATAXZVCPS |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\NIKHQAIQAU |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\QCFWYSKMHA |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\UMMBDNEQBN |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\LSBIHQFDVT |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\LTKMYBSEYZ |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents\MXPXCVPDVN |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |
Source: C:\Users\user\AppData\Local\Temp\1001425001\shop.exe |
Directory queried: C:\Users\user\Documents |