Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: INSERT_KEY_HERE |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 01 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 03 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 20 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 25 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetProcAddress |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: LoadLibraryA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: lstrcatA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: OpenEventA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CreateEventA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CloseHandle |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Sleep |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetUserDefaultLangID |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: VirtualAllocExNuma |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: VirtualFree |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetSystemInfo |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: VirtualAlloc |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: HeapAlloc |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetComputerNameA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: lstrcpyA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetProcessHeap |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetCurrentProcess |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: lstrlenA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ExitProcess |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GlobalMemoryStatusEx |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetSystemTime |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SystemTimeToFileTime |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: advapi32.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: gdi32.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: user32.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: crypt32.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ntdll.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetUserNameA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CreateDCA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetDeviceCaps |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ReleaseDC |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CryptStringToBinaryA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sscanf |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: VMwareVMware |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: HAL9TH |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: JohnDoe |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: DISPLAY |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %hu/%hu/%hu |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: http://185.215.113.17 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 00x00 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: !| |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: /2fb6c2cc8dce150a.php |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: /f1ddeb6592c03206/ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: default_valenciga |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetEnvironmentVariableA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetFileAttributesA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GlobalLock |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: HeapFree |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetFileSize |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GlobalSize |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CreateToolhelp32Snapshot |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: IsWow64Process |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Process32Next |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetLocalTime |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: FreeLibrary |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetTimeZoneInformation |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetSystemPowerStatus |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetVolumeInformationA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetWindowsDirectoryA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Process32First |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetLocaleInfoA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetUserDefaultLocaleName |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetModuleFileNameA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: DeleteFileA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: FindNextFileA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: LocalFree |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: FindClose |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SetEnvironmentVariableA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: LocalAlloc |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetFileSizeEx |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ReadFile |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SetFilePointer |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: WriteFile |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CreateFileA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: FindFirstFileA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CopyFileA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: VirtualProtect |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetLogicalProcessorInformationEx |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetLastError |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: lstrcpynA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: MultiByteToWideChar |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GlobalFree |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: WideCharToMultiByte |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GlobalAlloc |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: OpenProcess |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: TerminateProcess |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetCurrentProcessId |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: gdiplus.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ole32.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: bcrypt.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: wininet.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: shlwapi.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: shell32.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: psapi.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: rstrtmgr.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CreateCompatibleBitmap |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SelectObject |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: BitBlt |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: DeleteObject |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CreateCompatibleDC |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdipGetImageEncodersSize |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdipGetImageEncoders |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdipCreateBitmapFromHBITMAP |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdiplusStartup |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdiplusShutdown |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdipSaveImageToStream |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdipDisposeImage |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GdipFree |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetHGlobalFromStream |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CreateStreamOnHGlobal |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CoUninitialize |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CoInitialize |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CoCreateInstance |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: BCryptGenerateSymmetricKey |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: BCryptCloseAlgorithmProvider |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: BCryptDecrypt |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: BCryptSetProperty |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: BCryptDestroyKey |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: BCryptOpenAlgorithmProvider |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetWindowRect |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetDesktopWindow |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetDC |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CloseWindow |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: wsprintfA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: EnumDisplayDevicesA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetKeyboardLayoutList |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CharToOemW |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: wsprintfW |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RegQueryValueExA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RegEnumKeyExA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RegOpenKeyExA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RegCloseKey |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RegEnumValueA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CryptBinaryToStringA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CryptUnprotectData |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SHGetFolderPathA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ShellExecuteExA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: InternetOpenUrlA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: InternetConnectA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: InternetCloseHandle |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: InternetOpenA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: HttpSendRequestA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: HttpOpenRequestA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: InternetReadFile |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: InternetCrackUrlA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: StrCmpCA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: StrStrA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: StrCmpCW |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: PathMatchSpecA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: GetModuleFileNameExA |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RmStartSession |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RmRegisterResources |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RmGetList |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: RmEndSession |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_open |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_prepare_v2 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_step |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_column_text |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_finalize |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_close |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_column_bytes |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3_column_blob |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: encrypted_key |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: PATH |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: C:\ProgramData\nss3.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: NSS_Init |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: NSS_Shutdown |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: PK11_GetInternalKeySlot |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: PK11_FreeSlot |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: PK11_Authenticate |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: PK11SDR_Decrypt |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: C:\ProgramData\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT origin_url, username_value, password_value FROM logins |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: browser: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: profile: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: url: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: login: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: password: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Opera |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: OperaGX |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Network |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: cookies |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: .txt |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: TRUE |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: FALSE |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: autofill |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT name, value FROM autofill |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: history |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT url FROM urls LIMIT 1000 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: cc |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: name: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: month: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: year: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: card: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Cookies |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Login Data |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Web Data |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: History |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: logins.json |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: formSubmitURL |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: usernameField |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: encryptedUsername |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: encryptedPassword |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: guid |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT fieldname, value FROM moz_formhistory |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SELECT url FROM moz_places LIMIT 1000 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: cookies.sqlite |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: formhistory.sqlite |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: places.sqlite |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: plugins |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Local Extension Settings |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Sync Extension Settings |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: IndexedDB |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Opera Stable |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Opera GX Stable |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: CURRENT |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: chrome-extension_ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: _0.indexeddb.leveldb |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Local State |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: profiles.ini |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: chrome |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: opera |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: firefox |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: wallets |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %08lX%04lX%lu |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ProductName |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: x32 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: x64 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %d/%d/%d %d:%d:%d |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ProcessorNameString |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: DisplayName |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: DisplayVersion |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Network Info: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - IP: IP? |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Country: ISO? |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: System Summary: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - HWID: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - OS: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Architecture: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - UserName: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Computer Name: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Local Time: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - UTC: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Language: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Keyboards: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Laptop: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Running Path: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - CPU: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Threads: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Cores: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - RAM: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - Display Resolution: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: - GPU: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: User Agents: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Installed Apps: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: All Users: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Current User: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Process List: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: system_info.txt |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: freebl3.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: mozglue.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: msvcp140.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: nss3.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: softokn3.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: vcruntime140.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \Temp\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: .exe |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: runas |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: open |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: /c start |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %DESKTOP% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %APPDATA% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %LOCALAPPDATA% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %USERPROFILE% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %DOCUMENTS% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %PROGRAMFILES% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %PROGRAMFILES_86% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: %RECENT% |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: *.lnk |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: files |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \discord\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \Local Storage\leveldb\CURRENT |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \Local Storage\leveldb |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \Telegram Desktop\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: key_datas |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: D877F783D5D3EF8C* |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: map* |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: A7FDF864FBC10B77* |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: A92DAA6EA6F891F2* |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: F8806DD0C461824F* |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Telegram |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Tox |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: *.tox |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: *.ini |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Password |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 00000001 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 00000002 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 00000003 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: 00000004 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \Outlook\accounts.txt |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Pidgin |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \.purple\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: accounts.xml |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: dQw4w9WgXcQ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: token: |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Software\Valve\Steam |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: SteamPath |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \config\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ssfn* |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: config.vdf |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: DialogConfig.vdf |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: DialogConfigOverlay*.vdf |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: libraryfolders.vdf |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: loginusers.vdf |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \Steam\ |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: sqlite3.dll |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: browsers |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: done |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: soft |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: \Discord\tokens.txt |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: /c timeout /t 5 & del /f /q " |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: " & del "C:\ProgramData\*.dll"" & exit |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: C:\Windows\system32\cmd.exe |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: https |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Content-Type: multipart/form-data; boundary=---- |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: POST |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: HTTP/1.1 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: Content-Disposition: form-data; name=" |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: hwid |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: build |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: token |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: file_name |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: file |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: message |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 |
Source: 7.2.stealc_default2.exe.690000.0.unpack | String decryptor: screenshot.jpg |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: servicedny.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: authorisev.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: faulteyotk.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: dilemmadu.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: contemteny.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: goalyfeastz.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: opposezmny.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: seallysl.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: computeryrati.site |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: TeslaBrowser/5.5 |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: - Screen Resoluton: |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: - Physical Installed Memory: |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: Workgroup: - |
Source: 43.0.RDX123456.exe.700000.0.unpack | String decryptor: 4SD0y4--RLREBORN |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://.css |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://.jpg |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.72.65/dl?name=mixnine |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.72.65/dl?name=mixnine9 |
Source: blurayplayer32.exe, 00000027.00000002.4804225320.0000000000A7A000.00000004.00000020.00020000.00000000.sdmp, blurayplayer32.exe, 00000027.00000002.4804225320.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.158.202/ |
Source: blurayplayer32.exe, 00000027.00000002.4804225320.0000000000A7A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.158.202/en-GB |
Source: blurayplayer32.exe, 00000027.00000002.4804225320.0000000000A7A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.158.202/search/?q=67e28dd83d0ea62c110ba8177c27d78406abdd88be4b12eab517aa5c96bd86e89d8 |
Source: blurayplayer32.exe, 00000027.00000002.4804225320.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.158.202/search/?q=67e28dd83d0ea62c110ba8177c27d78406abdd88be4b12ebb517aa5c96bd86ed82d |
Source: 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4352385064.0000000000D0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/ |
Source: 3288f0a855.exe, 00000028.00000003.4353004958.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/0L |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/E |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/G |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012DF000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000006.00000002.4852244876.0000000001550000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000006.00000002.4838480992.0000000001288000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012DF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php/ |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001363000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php0001 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000006.00000002.4838480992.0000000001363000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php1 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001363000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php1001 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001363000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpP1 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001363000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpUsers |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012DF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpWu |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001363000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpuser |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpl |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012DF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncoded |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001363000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpnu |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/dobre/random.exe |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/dobre/random.exeA |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/dobre/splwow64.exeD |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/dobre/splwow64.exeP |
Source: new_v8.exe, 0000001E.00000002.3442416273.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255532935.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/f |
Source: new_v8.exe, 0000001E.00000002.3442416273.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255532935.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/iS |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/GOLD1234.exe |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/RDX123456.exe |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/RDX123456.exe= |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/hhnjqu9y.exe |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/new_v8.exe |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012B6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/stealc_default2.exe |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012B6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/stealc_default2.exe. |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/yxrd0ob7.exe |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/inc/yxrd0ob7.exe3 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/l |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012B6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/luma/random.exe |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012B6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/luma/random.exe5c7cf182 |
Source: axplong.exe, 00000006.00000002.4838480992.00000000012B6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/luma/random.exef5c7cedh |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/lumma/random.exe |
Source: new_v8.exe, 0000001E.00000002.3442416273.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000002.3446426303.0000000000CD3000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000002.3411095084.000000000097A000.00000004.00000010.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255532935.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000002.3415654770.0000000000C3F000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255308396.0000000000CCA000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4470400010.0000000000CAE000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4353004958.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4364749039.000000000055A000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: new_v8.exe, 0000001E.00000002.3442416273.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255532935.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exeC: |
Source: new_v8.exe, 0000001E.00000002.3442416273.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255532935.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exeP |
Source: 3288f0a855.exe, 00000028.00000003.4353004958.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exee |
Source: 3288f0a855.exe, 00000028.00000003.4353004958.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exeedU |
Source: 3288f0a855.exe, 00000028.00000003.4353004958.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exeex |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/rosoft |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/steam/random.exe |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/ta |
Source: stealc_default2.exe, 00000007.00000002.3111046427.000000000085B000.00000004.00000001.01000000.00000009.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.00000000009FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17 |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000003.2848424419.0000000000AE8000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.00000000009FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/ |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000A2D000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3111046427.000000000085B000.00000004.00000001.01000000.00000009.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.00000000009FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php/ |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php1 |
Source: stealc_default2.exe, 00000007.00000002.3112251700.00000000009FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php2 |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php: |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.php= |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpdll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpe |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpf |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phplg |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phplr |
Source: stealc_default2.exe, 00000007.00000002.3111046427.000000000085B000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phption: |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpwser |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/2fb6c2cc8dce150a.phpy |
Source: stealc_default2.exe, 00000007.00000002.3112251700.00000000009FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592 |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/freebl3.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/freebl3.dllC |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/mozglue.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/msvcp140.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/msvcp140.dll3 |
Source: stealc_default2.exe, 00000007.00000002.3112251700.00000000009FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/nss3. |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/nss3.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.00000000009FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/nss3.dllof |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/softokn3.dllG |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/sqlite3.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dll |
Source: stealc_default2.exe, 00000007.00000002.3112251700.0000000000A2D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dll6592c03206/nss3.dll |
Source: stealc_default2.exe, 00000007.00000002.3111046427.000000000085B000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.172fb6c2cc8dce150a.phption: |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001649000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/ |
Source: RegAsm.exe, 00000024.00000002.4842069839.0000000003FC7000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000024.00000002.4811775554.0000000001621000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.php |
Source: RegAsm.exe, 00000024.00000002.4811775554.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.php& |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001621000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.php; |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001649000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000024.00000002.4811775554.00000000015EA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000024.00000002.4811775554.0000000001621000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.php?scr=1 |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001649000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.php?scr=1# |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001621000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.php?scr=1hbWU9ImRhdGEiOyBmaWxlbmFtZT0iC |
Source: RegAsm.exe, 00000024.00000002.4811775554.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpL |
Source: RegAsm.exe, 00000024.00000002.4842069839.0000000003FC7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpR |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001621000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpS~ |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001621000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.php_~ |
Source: RegAsm.exe, 00000024.00000002.4830635244.0000000002F05000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpg |
Source: RegAsm.exe, 00000024.00000002.4811775554.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpj |
Source: RegAsm.exe, 00000024.00000002.4811775554.0000000001649000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpncoded |
Source: RegAsm.exe, 00000024.00000002.4830635244.0000000002F05000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpv |
Source: RegAsm.exe, 00000024.00000002.4811775554.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.217/CoreOPT/index.phpz |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/ |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/D |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp, Gxtuum.exe, 00000009.00000003.3406068969.0000000000913000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.php |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.php& |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp, Gxtuum.exe, 00000009.00000003.3406068969.0000000000913000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.php061101 |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.php6/Dem7kTu/index.php |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.phpI |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.phpf |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.phpj |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.phpl |
Source: Gxtuum.exe, 00000009.00000003.3406068969.0000000000913000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Dem7kTu/index.php~ |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008C5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/JavUmar.exe |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008C5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/JavUmar.exe. |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/Offnewhere.exe |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/ViewSizePreferences.SourceAumid01 |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp, Gxtuum.exe, 00000009.00000003.3406068969.0000000000913000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/stail.exe |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/ta |
Source: Gxtuum.exe, 00000009.00000002.4813288621.00000000008E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.36/u |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0 |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: splwow64.exe, 0000000B.00000002.2888179040.000000000041F000.00000004.00000001.01000000.0000000D.sdmp, splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r3.crl0 |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: axplong.exe, 00000006.00000002.4852244876.0000000001550000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: axplong.exe, 00000006.00000002.4852244876.0000000001550000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: svchost.exe, 00000022.00000002.4899370728.000001D5C2200000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: axplong.exe, 00000006.00000002.4852244876.0000000001550000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: axplong.exe, 00000006.00000002.4852244876.0000000001550000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: svchost.exe, 00000022.00000003.2993225021.000001D5C2400000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: stail.exe, 00000025.00000003.3206349513.0000000002300000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000025.00000002.4804223341.0000000002088000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000003.3218349961.0000000003120000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000002.4794965936.000000000056F000.00000004.00000020.00020000.00000000.sdmp, stail.tmp, 00000026.00000003.3218457618.0000000002210000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000002.4795778246.0000000002208000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://fsf.org/ |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://home.sevjoi17vt.top/FhmmyqGhAphHaXwiJfvm12 |
Source: JavUmar.exe, 0000001F.00000002.4793320459.0000000000582000.00000004.00000001.01000000.00000012.sdmp, JavUmar.exe, 0000001F.00000003.3280389269.00000000016EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://home.sevjoi17vt.top/FhmmyqGhAphHaXwiJfvm1730427912 |
Source: JavUmar.exe, 0000001F.00000003.3280389269.00000000016EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://home.sevjoi17vt.top/FhmmyqGhAphHaXwiJfvm17304279126963 |
Source: JavUmar.exe, 0000001F.00000003.3280389269.00000000016EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://home.sevjoi17vt.top/FhmmyqGhAphHaXwiJfvm1730427912KKd |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: splwow64.exe, 0000000B.00000000.2818845757.0000000000408000.00000002.00000001.01000000.0000000D.sdmp, splwow64.exe, 0000000B.00000002.2888142882.0000000000408000.00000002.00000001.01000000.0000000D.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: axplong.exe, 00000006.00000002.4852244876.0000000001550000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20 |
Source: splwow64.exe, 0000000B.00000002.2888179040.000000000041F000.00000004.00000001.01000000.0000000D.sdmp, splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0 |
Source: JavUmar.exe, 0000001F.00000003.3795884336.0000000001767000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://sevjoi17vt.top/v1/upload.php |
Source: JavUmar.exe, 0000001F.00000003.3795884336.0000000001767000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://sevjoi17vt.top/v1/upload.phpynamic |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000000.2879437391.0000000000799000.00000002.00000001.01000000.0000000E.sdmp, EcoCraft.scr, 0000001D.00000000.2909953578.0000000000179000.00000002.00000001.01000000.00000010.sdmp, EcoCraft.scr, 00000023.00000002.3037130048.0000000000179000.00000002.00000001.01000000.00000010.sdmp | String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: axplong.exe, 00000006.00000002.4838480992.0000000001305000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: stail.exe, 00000025.00000003.3206349513.0000000002300000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000025.00000002.4804223341.0000000002088000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000003.3218349961.0000000003120000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000002.4794965936.000000000056F000.00000004.00000020.00020000.00000000.sdmp, stail.tmp, 00000026.00000003.3218457618.0000000002210000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000002.4795778246.0000000002208000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://www.gnu.org/licenses/ |
Source: stail.exe, 00000025.00000003.3210182635.0000000002094000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000025.00000003.3208587232.0000000002300000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000002.4792518335.0000000000401000.00000020.00000001.01000000.0000001B.sdmp | String found in binary or memory: http://www.innosetup.com/ |
Source: stail.exe, 00000025.00000000.3204671035.0000000000401000.00000020.00000001.01000000.0000001A.sdmp | String found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline |
Source: stail.exe, 00000025.00000000.3204671035.0000000000401000.00000020.00000001.01000000.0000001A.sdmp | String found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU |
Source: stealc_default2.exe, stealc_default2.exe, 00000007.00000002.3148820583.000000006C13D000.00000002.00000001.01000000.00000019.sdmp | String found in binary or memory: http://www.mozilla.com/en-US/blocklist/ |
Source: stail.exe, 00000025.00000003.3210182635.0000000002094000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000025.00000003.3208587232.0000000002300000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000002.4792518335.0000000000401000.00000020.00000001.01000000.0000001B.sdmp | String found in binary or memory: http://www.remobjects.com/ps |
Source: stail.exe, 00000025.00000003.3210182635.0000000002094000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000025.00000003.3208587232.0000000002300000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000026.00000002.4792518335.0000000000401000.00000020.00000001.01000000.0000001B.sdmp | String found in binary or memory: http://www.remobjects.com/psU |
Source: stealc_default2.exe, 00000007.00000002.3148017233.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3129729389.000000001AFD9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.sqlite.org/copyright.html. |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: new_v8.exe, 0000001E.00000003.3045023186.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3660238701.00000000054F8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://ace-snapper-privately.ngrok-free.app/test/test |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://ace-snapper-privately.ngrok-free.app/test/testFailed |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: 3288f0a855.exe, 00000028.00000003.4145121508.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.adma |
Source: stealc_default2.exe, 00000007.00000002.3140672714.0000000027170000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3047409910.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3758849726.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3783337411.0000000000D6F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: new_v8.exe, 0000001E.00000003.3060297039.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3076312895.0000000000CDB000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3074856465.0000000000CD8000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3076783994.0000000000CE4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3074732448.0000000000CC8000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3060630671.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743 |
Source: stealc_default2.exe, 00000007.00000002.3140672714.0000000027170000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3758849726.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3783337411.0000000000D6F000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4145121508.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.clou |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare |
Source: new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic"HELP_BASE_URL":"https: |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/ |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/pu |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C32000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1& |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C32000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975549924.0000000000C33000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C32000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C32000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=mf3T |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C32000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v= |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC& |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l= |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub& |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw& |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe& |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=paSZSuZLtnMg& |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwNL |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl |
Source: new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l= |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/s |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu& |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67& |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1 |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0& |
Source: new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflarekL |
Source: stealc_default2.exe, 00000007.00000002.3140672714.0000000027170000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3047409910.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3758849726.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3783337411.0000000000D6F000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4145121508.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: stealc_default2.exe, 00000007.00000002.3140672714.0000000027170000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3047409910.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: JavUmar.exe, 0000001F.00000000.2978282515.0000000000583000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: svchost.exe, 00000022.00000003.2993225021.000001D5C2473000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/Prod/C: |
Source: svchost.exe, 00000022.00000003.2993225021.000001D5C2400000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C: |
Source: GOLD1234.exe, 0000002C.00000002.3684944310.00000000014E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://goalyfeastz.site/8 |
Source: GOLD1234.exe, 0000002C.00000002.3684944310.00000000014CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://goalyfeastz.site/?? |
Source: GOLD1234.exe, 0000002C.00000002.3684944310.00000000014E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://goalyfeastz.site/Y |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: new_v8.exe, 0000001E.00000003.3047409910.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3758849726.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3783337411.0000000000D6F000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4145121508.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: 3288f0a855.exe, 00000028.00000002.4508142028.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/ |
Source: 3288f0a855.exe, 00000028.00000003.4298058506.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/2 |
Source: 3288f0a855.exe, 00000028.00000003.4353004958.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/Mo |
Source: 3288f0a855.exe, 00000028.00000003.3625699652.0000000000D72000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4470400010.0000000000D0E000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4354418352.0000000000D90000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4519408449.0000000000D90000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/api |
Source: 3288f0a855.exe, 00000028.00000003.3659374635.0000000000D73000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3659725440.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3616953743.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3625699652.0000000000D72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/apiB |
Source: 3288f0a855.exe, 00000028.00000003.4178327822.0000000000D8E000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4144934066.0000000000D8D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/apiE |
Source: 3288f0a855.exe, 00000028.00000002.4470400010.0000000000D00000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4352385064.0000000000D00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/apiL |
Source: 3288f0a855.exe, 00000028.00000003.4353004958.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000002.4506037697.0000000000D64000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/apiaJm$ |
Source: 3288f0a855.exe, 00000028.00000003.4145121508.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/b~ |
Source: 3288f0a855.exe, 00000028.00000003.3658829272.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3616953743.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store/r |
Source: 3288f0a855.exe, 00000028.00000003.3658829272.0000000000D6E000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3489034650.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3489264964.0000000000D6F000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3584006517.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store:443/api |
Source: 3288f0a855.exe, 00000028.00000003.3616953743.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://necklacedmny.store:443/apiC |
Source: new_v8.exe, 0000001E.00000003.3045435699.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3097027296.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/ |
Source: new_v8.exe, 0000001E.00000002.3415654770.0000000000C0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/( |
Source: new_v8.exe, 0000001E.00000003.3097750570.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/3 |
Source: new_v8.exe, 0000001E.00000003.3044486078.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3045770050.0000000000CC1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3030309875.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3045435699.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/5 |
Source: new_v8.exe, 0000001E.00000003.3060297039.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3091069312.0000000000CC2000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3060630671.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3097027296.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/; |
Source: new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/U |
Source: new_v8.exe, 0000001E.00000003.3097750570.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3180922524.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/a |
Source: new_v8.exe, 0000001E.00000003.3090999050.0000000000CD3000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3030309875.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3108029948.0000000000CD3000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255308396.0000000000CCA000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/api |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/api.8 |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/api= |
Source: new_v8.exe, 0000001E.00000003.3030309875.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apiQ |
Source: new_v8.exe, 0000001E.00000002.3446426303.0000000000CD3000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3108029948.0000000000CD3000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255308396.0000000000CCA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apie |
Source: new_v8.exe, 0000001E.00000003.3255532935.0000000000CAE000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000002.3440425475.0000000000CAF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apie: |
Source: new_v8.exe, 0000001E.00000003.3255214017.0000000000CE1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3107929951.0000000000CD6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apiesO |
Source: new_v8.exe, 0000001E.00000003.2976296155.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975549924.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apii |
Source: new_v8.exe, 0000001E.00000003.3060297039.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apila |
Source: new_v8.exe, 0000001E.00000002.3415654770.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apim |
Source: new_v8.exe, 0000001E.00000003.3030309875.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/apimde |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3255214017.0000000000CE1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/h |
Source: new_v8.exe, 0000001E.00000003.3044486078.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3045770050.0000000000CC1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3045435699.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/m |
Source: new_v8.exe, 0000001E.00000003.3097750570.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/p |
Source: new_v8.exe, 0000001E.00000002.3415654770.0000000000C4F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou/r |
Source: new_v8.exe, 0000001E.00000003.3060297039.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://packagednyb.cyou:443/apiozilla |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: axplong.exe, 00000006.00000002.4852244876.0000000001550000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sectigo.com/CPS0 |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C4F000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2976296155.0000000000C51000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C4F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/F |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C4F000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2976296155.0000000000C51000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C4F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C4F000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2976296155.0000000000C51000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C4F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900f |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: stealc_default2.exe, 00000007.00000003.3075321770.000000002D22B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL |
Source: stealc_default2.exe, 00000007.00000002.3140672714.0000000027170000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3060297039.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3076312895.0000000000CDB000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3074856465.0000000000CD8000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3076783994.0000000000CE4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3074732448.0000000000CC8000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3060630671.0000000000CC4000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3758849726.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3783337411.0000000000D6F000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4145121508.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: stealc_default2.exe, 00000007.00000002.3140672714.0000000027170000.00000004.00000020.00020000.00000000.sdmp, stealc_default2.exe, 00000007.00000002.3112251700.0000000000AD1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3047409910.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3758849726.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3783337411.0000000000D6F000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.4145121508.0000000000D70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: splwow64.exe, 0000000B.00000003.2833312201.00000000028CA000.00000004.00000020.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000002.4852242929.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Jurisdiction.pif, 00000015.00000003.2889206601.0000000003F4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/06 |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: stealc_default2.exe, 00000007.00000003.2833417786.0000000000A90000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3009118498.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, JavUmar.exe, 0000001F.00000003.3650241712.0000000003665000.00000004.00000020.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3414104883.00000000054FC000.00000004.00000800.00020000.00000000.sdmp, 3288f0a855.exe, 00000028.00000003.3435080893.00000000054F9000.00000004.00000800.00020000.00000000.sdmp, GOLD1234.exe, 0000002C.00000003.3525441016.0000000003BCC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: stealc_default2.exe, 00000007.00000002.3111046427.00000000006EA000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/about/ |
Source: new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc |
Source: stealc_default2.exe, 00000007.00000002.3111046427.00000000006EA000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/ |
Source: new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6 |
Source: stealc_default2.exe, 00000007.00000002.3111046427.00000000006EA000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ |
Source: stealc_default2.exe, 00000007.00000003.3075321770.000000002D22B000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: stealc_default2.exe, 00000007.00000002.3111046427.00000000006EA000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ZoZ2ZuaGJncGpkZW5qZ21kZ29laWFwcGFmbG58MXwwfDB8SmF4eCBM |
Source: stealc_default2.exe, 00000007.00000002.3111046427.00000000006EA000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/lvYnwxfDB8MHxMYXN0UGFzc3xoZG9raWVqbnBpbWFrZWRoYWpoZGxj |
Source: new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: stealc_default2.exe, 00000007.00000003.3075321770.000000002D22B000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: stealc_default2.exe, 00000007.00000002.3111046427.00000000006EA000.00000004.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/ |
Source: stealc_default2.exe, 00000007.00000003.3075321770.000000002D22B000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.3046539307.0000000003D31000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: new_v8.exe, 0000001E.00000003.2960789815.0000000000CB1000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975053372.0000000000CB4000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2959474717.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2972709813.0000000000CB0000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975469173.0000000000CB5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: new_v8.exe, 0000001E.00000003.2975549924.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2961250816.0000000000C71000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2975104545.0000000000C70000.00000004.00000020.00020000.00000000.sdmp, new_v8.exe, 0000001E.00000003.2974128811.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mstask.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dui70.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: chartv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: mozglue.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: mstask.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: dui70.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: chartv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: shfolder.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: riched20.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: usp10.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: msls31.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: textinputframework.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: coremessaging.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: textshaping.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: wsock32.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Section loaded: rasadhlp.dll | |
Source: C:\Windows\SysWOW64\choice.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: xmllite.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: jscript.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: wsock32.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: webio.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: wbemcomn.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: amsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: windowscodecs.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: rstrtmgr.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\10000020101\JavUmar.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: dwrite.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: riched20.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: usp10.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: msls31.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: windowscodecs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: amsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: jscript.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: wsock32.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Section loaded: mpr.dll | |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\23a0892ef8\Gxtuum.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000833001\dc753b12e1.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\10000061101\stail.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\is-EVAOC.tmp\stail.tmp | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000857001\3288f0a855.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\YJJA1RDG0PY87AD1W2WB98M4U9.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AF1F4 second address: 7AEA9D instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA1ECFCB296h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jng 00007FA1ECFCB29Ch 0x00000010 jnc 00007FA1ECFCB296h 0x00000016 popad 0x00000017 nop 0x00000018 jp 00007FA1ECFCB29Ch 0x0000001e mov dword ptr [ebp+122D34C7h], ecx 0x00000024 push dword ptr [ebp+122D0491h] 0x0000002a xor dword ptr [ebp+122D2F94h], eax 0x00000030 call dword ptr [ebp+122D34CFh] 0x00000036 pushad 0x00000037 jnc 00007FA1ECFCB2ACh 0x0000003d xor eax, eax 0x0000003f sub dword ptr [ebp+122D3052h], esi 0x00000045 mov edx, dword ptr [esp+28h] 0x00000049 mov dword ptr [ebp+122D3052h], eax 0x0000004f mov dword ptr [ebp+122D38FBh], eax 0x00000055 mov dword ptr [ebp+122D3052h], ecx 0x0000005b mov esi, 0000003Ch 0x00000060 jg 00007FA1ECFCB29Ch 0x00000066 add esi, dword ptr [esp+24h] 0x0000006a jg 00007FA1ECFCB2ABh 0x00000070 lodsw 0x00000072 cmc 0x00000073 add eax, dword ptr [esp+24h] 0x00000077 stc 0x00000078 mov ebx, dword ptr [esp+24h] 0x0000007c cmc 0x0000007d nop 0x0000007e pushad 0x0000007f pushad 0x00000080 jbe 00007FA1ECFCB296h 0x00000086 push eax 0x00000087 push edx 0x00000088 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AEA9D second address: 7AEAA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AEAA5 second address: 7AEAB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007FA1ECFCB296h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AEAB6 second address: 7AEABA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7AEABA second address: 7AEAC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92530C second address: 925316 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FA1ED006906h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925316 second address: 92531A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92531A second address: 92532C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007FA1ED00690Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92532C second address: 92534A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FA1ECFCB296h 0x00000009 jmp 00007FA1ECFCB2A3h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9255AF second address: 9255BF instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA1ED006906h 0x00000008 jc 00007FA1ED006906h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9255BF second address: 9255C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9255C5 second address: 9255CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FA1ED006906h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9255CF second address: 9255F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Ch 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA1ECFCB2A2h 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9255F7 second address: 9255FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9255FB second address: 925663 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ECFCB2A8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push edx 0x0000000f jmp 00007FA1ECFCB2A5h 0x00000014 pop edx 0x00000015 pushad 0x00000016 jno 00007FA1ECFCB296h 0x0000001c pushad 0x0000001d popad 0x0000001e jc 00007FA1ECFCB296h 0x00000024 pushad 0x00000025 popad 0x00000026 popad 0x00000027 pushad 0x00000028 jmp 00007FA1ECFCB2A5h 0x0000002d pushad 0x0000002e popad 0x0000002f pushad 0x00000030 popad 0x00000031 popad 0x00000032 push edi 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9257B9 second address: 9257E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007FA1ED006910h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA1ED00690Fh 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9257E3 second address: 9257E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9257E9 second address: 9257EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9257EF second address: 92580A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A5h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92580A second address: 92580E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925AE5 second address: 925AEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 928135 second address: 7AEA9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop esi 0x00000006 add dword ptr [esp], 47592A2Fh 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007FA1ED006908h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 0000001Ch 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 sub ecx, dword ptr [ebp+122D37EFh] 0x0000002d push dword ptr [ebp+122D0491h] 0x00000033 mov dword ptr [ebp+1244C4D4h], ecx 0x00000039 call dword ptr [ebp+122D34CFh] 0x0000003f pushad 0x00000040 jnc 00007FA1ED00691Ch 0x00000046 xor eax, eax 0x00000048 sub dword ptr [ebp+122D3052h], esi 0x0000004e mov edx, dword ptr [esp+28h] 0x00000052 mov dword ptr [ebp+122D3052h], eax 0x00000058 mov dword ptr [ebp+122D38FBh], eax 0x0000005e mov dword ptr [ebp+122D3052h], ecx 0x00000064 mov esi, 0000003Ch 0x00000069 jg 00007FA1ED00690Ch 0x0000006f add esi, dword ptr [esp+24h] 0x00000073 jg 00007FA1ED00691Bh 0x00000079 lodsw 0x0000007b cmc 0x0000007c add eax, dword ptr [esp+24h] 0x00000080 stc 0x00000081 mov ebx, dword ptr [esp+24h] 0x00000085 cmc 0x00000086 nop 0x00000087 pushad 0x00000088 pushad 0x00000089 jbe 00007FA1ED006906h 0x0000008f push eax 0x00000090 push edx 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 928251 second address: 928291 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA1ECFCB298h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xor dword ptr [esp], 2CAAD2AAh 0x00000013 mov esi, dword ptr [ebp+122D30AAh] 0x00000019 mov edi, dword ptr [ebp+122D3663h] 0x0000001f lea ebx, dword ptr [ebp+1244D085h] 0x00000025 sub edx, 4743EB30h 0x0000002b xchg eax, ebx 0x0000002c push ecx 0x0000002d jmp 00007FA1ECFCB29Bh 0x00000032 pop ecx 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 pushad 0x00000038 popad 0x00000039 pop eax 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 928300 second address: 928380 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA1ED006916h 0x0000000b popad 0x0000000c add dword ptr [esp], 40F39D3Ah 0x00000013 jmp 00007FA1ED00690Eh 0x00000018 push 00000003h 0x0000001a push 00000000h 0x0000001c stc 0x0000001d push 00000003h 0x0000001f mov dword ptr [ebp+122D300Ch], ecx 0x00000025 push A40BE094h 0x0000002a jo 00007FA1ED00691Eh 0x00000030 push eax 0x00000031 jmp 00007FA1ED006916h 0x00000036 pop eax 0x00000037 xor dword ptr [esp], 640BE094h 0x0000003e or dword ptr [ebp+122D2F94h], edi 0x00000044 lea ebx, dword ptr [ebp+1244D08Eh] 0x0000004a or edi, 7B9F71F6h 0x00000050 xchg eax, ebx 0x00000051 push ebx 0x00000052 push ebx 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 928554 second address: 92855E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FA1ECFCB296h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9393C8 second address: 9393DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006910h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 947EF0 second address: 947F02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA1ECFCB29Dh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 947F02 second address: 947F07 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 945EE8 second address: 945F14 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d jo 00007FA1ECFCB296h 0x00000013 popad 0x00000014 jmp 00007FA1ECFCB2A8h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 945F14 second address: 945F34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FA1ED006906h 0x0000000a jmp 00007FA1ED006916h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 946104 second address: 946116 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA1ECFCB296h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007FA1ECFCB296h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9463A6 second address: 9463E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006910h 0x00000007 js 00007FA1ED006906h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FA1ED006919h 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9463E2 second address: 9463E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9463E6 second address: 9463F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9463F4 second address: 9463FA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 94655C second address: 946560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 946560 second address: 946572 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA1ECFCB29Ch 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 946572 second address: 94657A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 94657A second address: 946594 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 946B77 second address: 946B7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 946B7B second address: 946B81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 946CB4 second address: 946CBA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 946F7A second address: 946F9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Bh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007FA1ECFCB2A2h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 93F263 second address: 93F269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 94C5AE second address: 94C5C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA1ECFCB2A1h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 94C5C9 second address: 94C5CF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 94B307 second address: 94B31A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB29Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9524AA second address: 9524BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 jnl 00007FA1ED006906h 0x0000000c jg 00007FA1ED006906h 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 952C96 second address: 952C9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 952E1E second address: 952E22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 952E22 second address: 952E34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 js 00007FA1ECFCB2D2h 0x0000000d push esi 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 952E34 second address: 952E56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007FA1ED006906h 0x0000000d jmp 00007FA1ED006915h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956718 second address: 956726 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956726 second address: 95672F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95672F second address: 956733 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956733 second address: 956752 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push ebx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jnc 00007FA1ED006906h 0x00000015 popad 0x00000016 pop ebx 0x00000017 mov eax, dword ptr [eax] 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c pushad 0x0000001d popad 0x0000001e pop eax 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956752 second address: 956758 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956758 second address: 95677C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006916h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95677C second address: 95679E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov esi, dword ptr [ebp+12456013h] 0x0000000d push 15A062CCh 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jbe 00007FA1ECFCB296h 0x0000001b jg 00007FA1ECFCB296h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956C0E second address: 956C14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956C14 second address: 956C31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jbe 00007FA1ECFCB29Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956C31 second address: 956C39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9572FC second address: 95730D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB29Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9573B5 second address: 9573B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9573B9 second address: 9573CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB29Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9575AF second address: 9575B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9575B3 second address: 9575B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 957681 second address: 957687 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 957687 second address: 95768B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95768B second address: 95768F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 957E24 second address: 957E28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 957E28 second address: 957E9C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push edi 0x0000000f call 00007FA1ED006908h 0x00000014 pop edi 0x00000015 mov dword ptr [esp+04h], edi 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc edi 0x00000022 push edi 0x00000023 ret 0x00000024 pop edi 0x00000025 ret 0x00000026 push edi 0x00000027 jmp 00007FA1ED006913h 0x0000002c pop edi 0x0000002d push 00000000h 0x0000002f movsx esi, bx 0x00000032 push 00000000h 0x00000034 or esi, dword ptr [ebp+122D1AA0h] 0x0000003a xchg eax, ebx 0x0000003b jmp 00007FA1ED006914h 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 958729 second address: 958744 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB2A7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9585EF second address: 9585F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9585F5 second address: 9585F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95A102 second address: 95A108 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95AAF9 second address: 95AAFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95AAFF second address: 95AB04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95AB04 second address: 95AB21 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96052C second address: 96054B instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA1ED006906h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA1ED006911h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 961501 second address: 961513 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a je 00007FA1ECFCB29Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96251C second address: 962526 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FA1ED006906h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95D39F second address: 95D3A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9616B6 second address: 9616BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9616BA second address: 9616C0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 964673 second address: 964681 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007FA1ED006906h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9616C0 second address: 9616C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9637D2 second address: 9637DC instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA1ED00690Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9616C5 second address: 961767 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a or dword ptr [ebp+122D1A9Ah], ebx 0x00000010 push dword ptr fs:[00000000h] 0x00000017 pushad 0x00000018 call 00007FA1ECFCB29Ch 0x0000001d js 00007FA1ECFCB296h 0x00000023 pop edx 0x00000024 mov edx, dword ptr [ebp+122D39BFh] 0x0000002a popad 0x0000002b mov dword ptr fs:[00000000h], esp 0x00000032 push 00000000h 0x00000034 push eax 0x00000035 call 00007FA1ECFCB298h 0x0000003a pop eax 0x0000003b mov dword ptr [esp+04h], eax 0x0000003f add dword ptr [esp+04h], 0000001Ch 0x00000047 inc eax 0x00000048 push eax 0x00000049 ret 0x0000004a pop eax 0x0000004b ret 0x0000004c mov dword ptr [ebp+12454CF6h], ecx 0x00000052 mov eax, dword ptr [ebp+122D0745h] 0x00000058 jng 00007FA1ECFCB2A7h 0x0000005e jmp 00007FA1ECFCB2A1h 0x00000063 push FFFFFFFFh 0x00000065 mov di, 440Ch 0x00000069 nop 0x0000006a push ebx 0x0000006b push eax 0x0000006c push edx 0x0000006d jmp 00007FA1ECFCB2A8h 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9637DC second address: 9637E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 961767 second address: 96176B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96493E second address: 964944 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96589E second address: 9658A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96176B second address: 96178A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FA1ED006915h 0x00000010 jmp 00007FA1ED00690Fh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91CE41 second address: 91CE47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 963895 second address: 96389B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 964944 second address: 96494A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91CE47 second address: 91CE59 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a js 00007FA1ED006906h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96389B second address: 96389F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91CE59 second address: 91CE6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FA1ED006906h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d jbe 00007FA1ED006925h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91CE6E second address: 91CE8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ECFCB2A9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91CE8B second address: 91CEA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ED006914h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91CEA3 second address: 91CEA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91CEA7 second address: 91CEB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96A916 second address: 96A971 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov dword ptr [ebp+122D3475h], ebx 0x00000012 push 00000000h 0x00000014 sub di, CE90h 0x00000019 push 00000000h 0x0000001b or dword ptr [ebp+1247613Eh], esi 0x00000021 mov ebx, dword ptr [ebp+122D2D2Fh] 0x00000027 xchg eax, esi 0x00000028 jl 00007FA1ECFCB2A2h 0x0000002e push eax 0x0000002f push ecx 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007FA1ECFCB2A2h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96AAF4 second address: 96AAF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96AAF8 second address: 96AB98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 jnl 00007FA1ECFCB2A4h 0x0000000e nop 0x0000000f xor dword ptr [ebp+1245F600h], edi 0x00000015 push dword ptr fs:[00000000h] 0x0000001c push 00000000h 0x0000001e push edx 0x0000001f call 00007FA1ECFCB298h 0x00000024 pop edx 0x00000025 mov dword ptr [esp+04h], edx 0x00000029 add dword ptr [esp+04h], 00000017h 0x00000031 inc edx 0x00000032 push edx 0x00000033 ret 0x00000034 pop edx 0x00000035 ret 0x00000036 mov edi, dword ptr [ebp+122D2FEEh] 0x0000003c mov dword ptr fs:[00000000h], esp 0x00000043 call 00007FA1ECFCB29Dh 0x00000048 mov edi, dword ptr [ebp+122D3787h] 0x0000004e pop ebx 0x0000004f mov eax, dword ptr [ebp+122D1675h] 0x00000055 mov ebx, edi 0x00000057 mov ebx, dword ptr [ebp+1246D4E4h] 0x0000005d push FFFFFFFFh 0x0000005f clc 0x00000060 nop 0x00000061 jmp 00007FA1ECFCB29Dh 0x00000066 push eax 0x00000067 push eax 0x00000068 push edx 0x00000069 push ebx 0x0000006a jmp 00007FA1ECFCB2A2h 0x0000006f pop ebx 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96C8C1 second address: 96C8F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ED006917h 0x00000009 popad 0x0000000a pop edi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push esi 0x00000010 pop esi 0x00000011 jmp 00007FA1ED006914h 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96C8F9 second address: 96C97B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007FA1ECFCB298h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 00000015h 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 mov ebx, dword ptr [ebp+122D1CB6h] 0x0000002a push 00000000h 0x0000002c jmp 00007FA1ECFCB29Eh 0x00000031 push 00000000h 0x00000033 and bx, 007Eh 0x00000038 xchg eax, esi 0x00000039 pushad 0x0000003a push edi 0x0000003b jnc 00007FA1ECFCB296h 0x00000041 pop edi 0x00000042 jmp 00007FA1ECFCB29Ah 0x00000047 popad 0x00000048 push eax 0x00000049 pushad 0x0000004a pushad 0x0000004b pushad 0x0000004c popad 0x0000004d push esi 0x0000004e pop esi 0x0000004f popad 0x00000050 push eax 0x00000051 push edx 0x00000052 jmp 00007FA1ECFCB29Eh 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96D871 second address: 96D8E5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jl 00007FA1ED006906h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d ja 00007FA1ED006918h 0x00000013 nop 0x00000014 mov dword ptr [ebp+122D187Bh], eax 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push edx 0x0000001f call 00007FA1ED006908h 0x00000024 pop edx 0x00000025 mov dword ptr [esp+04h], edx 0x00000029 add dword ptr [esp+04h], 00000018h 0x00000031 inc edx 0x00000032 push edx 0x00000033 ret 0x00000034 pop edx 0x00000035 ret 0x00000036 jmp 00007FA1ED00690Fh 0x0000003b push 00000000h 0x0000003d push eax 0x0000003e pop ebx 0x0000003f mov bl, 62h 0x00000041 xchg eax, esi 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 js 00007FA1ED006906h 0x0000004b jno 00007FA1ED006906h 0x00000051 popad 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96D8E5 second address: 96D8F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jnc 00007FA1ECFCB296h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96CA6C second address: 96CA70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96CA70 second address: 96CA74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96CA74 second address: 96CA8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA1ED006910h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96CA8D second address: 96CA9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB29Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96CB51 second address: 96CB5B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA1ED006906h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FA27 second address: 96FA69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push edx 0x0000000a call 00007FA1ECFCB298h 0x0000000f pop edx 0x00000010 mov dword ptr [esp+04h], edx 0x00000014 add dword ptr [esp+04h], 0000001Ch 0x0000001c inc edx 0x0000001d push edx 0x0000001e ret 0x0000001f pop edx 0x00000020 ret 0x00000021 push 00000000h 0x00000023 sub dword ptr [ebp+122D1EEDh], edx 0x00000029 push 00000000h 0x0000002b or dword ptr [ebp+122D2E5Dh], ebx 0x00000031 push eax 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 push edi 0x00000037 pop edi 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FA69 second address: 96FA6F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FBD3 second address: 96FBD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FBD9 second address: 96FC64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 mov dword ptr [esp], eax 0x00000009 mov bx, 3AD4h 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push 00000000h 0x00000016 push ebx 0x00000017 call 00007FA1ED006908h 0x0000001c pop ebx 0x0000001d mov dword ptr [esp+04h], ebx 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc ebx 0x0000002a push ebx 0x0000002b ret 0x0000002c pop ebx 0x0000002d ret 0x0000002e clc 0x0000002f mov dword ptr [ebp+122D258Eh], edi 0x00000035 mov dword ptr fs:[00000000h], esp 0x0000003c jmp 00007FA1ED00690Fh 0x00000041 mov eax, dword ptr [ebp+122D0B31h] 0x00000047 mov dword ptr [ebp+122D2CF5h], edi 0x0000004d push FFFFFFFFh 0x0000004f push 00000000h 0x00000051 push esi 0x00000052 call 00007FA1ED006908h 0x00000057 pop esi 0x00000058 mov dword ptr [esp+04h], esi 0x0000005c add dword ptr [esp+04h], 0000001Bh 0x00000064 inc esi 0x00000065 push esi 0x00000066 ret 0x00000067 pop esi 0x00000068 ret 0x00000069 mov bh, 59h 0x0000006b nop 0x0000006c push eax 0x0000006d push edx 0x0000006e pushad 0x0000006f pushad 0x00000070 popad 0x00000071 pushad 0x00000072 popad 0x00000073 popad 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FC64 second address: 96FC6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FC6A second address: 96FC6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FC6E second address: 96FC85 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007FA1ECFCB29Ch 0x00000011 jnl 00007FA1ECFCB296h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96FC85 second address: 96FC8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9718D2 second address: 9718D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9718D6 second address: 971949 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FA1ED00690Ah 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007FA1ED006908h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 jmp 00007FA1ED006911h 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push edi 0x00000033 call 00007FA1ED006908h 0x00000038 pop edi 0x00000039 mov dword ptr [esp+04h], edi 0x0000003d add dword ptr [esp+04h], 00000019h 0x00000045 inc edi 0x00000046 push edi 0x00000047 ret 0x00000048 pop edi 0x00000049 ret 0x0000004a sub dword ptr [ebp+122D28D1h], edi 0x00000050 push eax 0x00000051 pushad 0x00000052 pushad 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 971949 second address: 97194F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 973EBA second address: 973EBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 97B735 second address: 97B762 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA1ECFCB296h 0x0000000a jmp 00007FA1ECFCB2A9h 0x0000000f pop edi 0x00000010 push edx 0x00000011 jnp 00007FA1ECFCB29Ch 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 97BB39 second address: 97BB5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FA1ED006917h 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FA1ED00690Fh 0x00000013 push eax 0x00000014 push edx 0x00000015 push edx 0x00000016 pop edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 980A45 second address: 980A49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 980B43 second address: 980B47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 980C2B second address: 980C2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 980C2F second address: 980C38 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 980C38 second address: 980C3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 980D2E second address: 980D33 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 985E90 second address: 985E94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 985E94 second address: 985EE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FA1ED00691Fh 0x0000000c jmp 00007FA1ED006919h 0x00000011 ja 00007FA1ED006912h 0x00000017 je 00007FA1ED006906h 0x0000001d je 00007FA1ED006906h 0x00000023 popad 0x00000024 pushad 0x00000025 push edi 0x00000026 jmp 00007FA1ED006910h 0x0000002b pop edi 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f pop eax 0x00000030 pushad 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 985291 second address: 9852C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ECFCB2A6h 0x00000009 jnc 00007FA1ECFCB296h 0x0000000f popad 0x00000010 pushad 0x00000011 jmp 00007FA1ECFCB29Eh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98559C second address: 9855A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9855A0 second address: 9855BB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FA1ECFCB2A2h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9855BB second address: 9855E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ED00690Fh 0x00000009 pop ecx 0x0000000a pop edi 0x0000000b jg 00007FA1ED006923h 0x00000011 jmp 00007FA1ED00690Dh 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 985A69 second address: 985A6E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 985BC2 second address: 985BC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98917E second address: 989199 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A5h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98F57C second address: 98F58F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FA1ED00690Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98F58F second address: 98F5AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jl 00007FA1ECFCB296h 0x0000000c popad 0x0000000d popad 0x0000000e pushad 0x0000000f jmp 00007FA1ECFCB29Ch 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98F5AD second address: 98F5D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ED006915h 0x00000009 popad 0x0000000a push ecx 0x0000000b jg 00007FA1ED006906h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98DEC0 second address: 98DED1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jns 00007FA1ECFCB296h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98DED1 second address: 98DEDB instructions: 0x00000000 rdtsc 0x00000002 js 00007FA1ED006906h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98DEDB second address: 98DEF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA1ECFCB2A3h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E1B0 second address: 98E1BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007FA1ED006906h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E1BC second address: 98E1F9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FA1ECFCB29Bh 0x00000008 pop ecx 0x00000009 jne 00007FA1ECFCB2B0h 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 jmp 00007FA1ECFCB2A8h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e jnl 00007FA1ECFCB296h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E1F9 second address: 98E1FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E1FD second address: 98E21B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA1ECFCB2A8h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E34F second address: 98E356 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E4D5 second address: 98E4F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FA1ECFCB2A5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007FA1ECFCB2A2h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E7B6 second address: 98E7C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98E7C9 second address: 98E7DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push edi 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jg 00007FA1ECFCB296h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EA9F second address: 98EAA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EAA3 second address: 98EAA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EAA9 second address: 98EAB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EAB2 second address: 98EABB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EABB second address: 98EACD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007FA1ED006906h 0x00000009 push eax 0x0000000a pop eax 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EACD second address: 98EAD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FA1ECFCB296h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EDFC second address: 98EE05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EE05 second address: 98EE09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EF7F second address: 98EF85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EF85 second address: 98EF8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98EF8A second address: 98EF9C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Dh 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 93FDB1 second address: 93FDB7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 93FDB7 second address: 93FDC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FA1ED006908h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 994F4B second address: 994F51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 994F51 second address: 994F56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 993DF3 second address: 993E14 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Fh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jns 00007FA1ECFCB29Ch 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 993E14 second address: 993E2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Bh 0x00000007 push edx 0x00000008 js 00007FA1ED006906h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 993E2A second address: 993E4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007FA1ECFCB2A6h 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9945BE second address: 9945C3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9945C3 second address: 9945E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA1ECFCB2A9h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9945E3 second address: 9945E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 994779 second address: 994791 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 jmp 00007FA1ECFCB29Dh 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99928F second address: 999297 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 999297 second address: 9992A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ECFCB29Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9992A7 second address: 9992AD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9552C1 second address: 7AEA9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 jmp 00007FA1ECFCB29Fh 0x0000000d push dword ptr [ebp+122D0491h] 0x00000013 push 00000000h 0x00000015 push eax 0x00000016 call 00007FA1ECFCB298h 0x0000001b pop eax 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 add dword ptr [esp+04h], 0000001Dh 0x00000028 inc eax 0x00000029 push eax 0x0000002a ret 0x0000002b pop eax 0x0000002c ret 0x0000002d xor dword ptr [ebp+122D291Eh], edx 0x00000033 push ebx 0x00000034 call 00007FA1ECFCB29Eh 0x00000039 mov di, 31E6h 0x0000003d pop edx 0x0000003e pop edi 0x0000003f call dword ptr [ebp+122D34CFh] 0x00000045 pushad 0x00000046 jnc 00007FA1ECFCB2ACh 0x0000004c xor eax, eax 0x0000004e sub dword ptr [ebp+122D3052h], esi 0x00000054 mov edx, dword ptr [esp+28h] 0x00000058 mov dword ptr [ebp+122D3052h], eax 0x0000005e mov dword ptr [ebp+122D38FBh], eax 0x00000064 mov dword ptr [ebp+122D3052h], ecx 0x0000006a mov esi, 0000003Ch 0x0000006f jg 00007FA1ECFCB29Ch 0x00000075 add esi, dword ptr [esp+24h] 0x00000079 jg 00007FA1ECFCB2ABh 0x0000007f lodsw 0x00000081 cmc 0x00000082 add eax, dword ptr [esp+24h] 0x00000086 stc 0x00000087 mov ebx, dword ptr [esp+24h] 0x0000008b cmc 0x0000008c nop 0x0000008d pushad 0x0000008e pushad 0x0000008f jbe 00007FA1ECFCB296h 0x00000095 push eax 0x00000096 push edx 0x00000097 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 955458 second address: 95545D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95545D second address: 9554B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FA1ECFCB296h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xor dword ptr [esp], 40607A8Fh 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007FA1ECFCB298h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 0000001Dh 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e push 7616ECC0h 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007FA1ECFCB2A4h 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9554B3 second address: 9554B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9554B9 second address: 9554D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB2A4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95557D second address: 955590 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9556CF second address: 9556D9 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA1ECFCB296h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9557A9 second address: 9557AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 955EA5 second address: 955EB3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pushad 0x0000000c popad 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95609B second address: 9560C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007FA1ED00690Dh 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 jp 00007FA1ED006906h 0x0000001d pop ecx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9560C1 second address: 9560DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB2A9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9560DE second address: 95610C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006918h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d jc 00007FA1ED006912h 0x00000013 je 00007FA1ED00690Ch 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95610C second address: 95612C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dword ptr [esp+04h], eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA1ECFCB2A5h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9562AE second address: 956331 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA1ED00690Ch 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007FA1ED006908h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000019h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 mov edi, esi 0x0000002a jmp 00007FA1ED006911h 0x0000002f lea eax, dword ptr [ebp+12479ACFh] 0x00000035 push 00000000h 0x00000037 push edx 0x00000038 call 00007FA1ED006908h 0x0000003d pop edx 0x0000003e mov dword ptr [esp+04h], edx 0x00000042 add dword ptr [esp+04h], 00000014h 0x0000004a inc edx 0x0000004b push edx 0x0000004c ret 0x0000004d pop edx 0x0000004e ret 0x0000004f jc 00007FA1ED006908h 0x00000055 mov edi, edx 0x00000057 or di, 96EBh 0x0000005c nop 0x0000005d push eax 0x0000005e push edx 0x0000005f push edi 0x00000060 jnl 00007FA1ED006906h 0x00000066 pop edi 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956331 second address: 93FDB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007FA1ECFCB2A5h 0x00000010 jmp 00007FA1ECFCB29Bh 0x00000015 popad 0x00000016 nop 0x00000017 push 00000000h 0x00000019 push edi 0x0000001a call 00007FA1ECFCB298h 0x0000001f pop edi 0x00000020 mov dword ptr [esp+04h], edi 0x00000024 add dword ptr [esp+04h], 00000018h 0x0000002c inc edi 0x0000002d push edi 0x0000002e ret 0x0000002f pop edi 0x00000030 ret 0x00000031 mov dword ptr [ebp+122D35A3h], eax 0x00000037 mov dword ptr [ebp+1244AC4Bh], edx 0x0000003d call dword ptr [ebp+122D1F3Bh] 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007FA1ECFCB29Ah 0x0000004a jmp 00007FA1ECFCB2A2h 0x0000004f pop edx 0x00000050 pop eax 0x00000051 push eax 0x00000052 push edx 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 popad 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 998359 second address: 998370 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA1ED006919h 0x00000008 jmp 00007FA1ED00690Dh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99851A second address: 99855B instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA1ECFCB296h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA1ECFCB2A9h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 push esi 0x00000016 pop esi 0x00000017 pop eax 0x00000018 pushad 0x00000019 jmp 00007FA1ECFCB2A2h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99855B second address: 998560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 998560 second address: 998565 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 998978 second address: 998982 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA1ED006906h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 998AD4 second address: 998AD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 998AD8 second address: 998AE8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jp 00007FA1ED006906h 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99CCBE second address: 99CCD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA1ECFCB29Ah 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99F0AE second address: 99F0B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99F0B3 second address: 99F0B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99F0B9 second address: 99F0C3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A07F5 second address: 9A0823 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB2A4h 0x00000009 jmp 00007FA1ECFCB2A6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A35F7 second address: 9A3601 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA1ED006906h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A3154 second address: 9A317A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FA1ECFCB2A0h 0x0000000b jmp 00007FA1ECFCB2A0h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A32EE second address: 9A32F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A32F2 second address: 9A32FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A32FB second address: 9A3300 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A7E8F second address: 9A7E93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A7E93 second address: 9A7EBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jg 00007FA1ED006906h 0x0000000f jmp 00007FA1ED006918h 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A7AB3 second address: 9A7ABF instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA1ECFCB296h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9AD56F second address: 9AD573 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9AD573 second address: 9AD579 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9ABF74 second address: 9ABFB2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006913h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA1ED006911h 0x0000000e jmp 00007FA1ED006916h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9AC431 second address: 9AC43F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jnp 00007FA1ECFCB296h 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9AC43F second address: 9AC444 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9AC5C4 second address: 9AC5DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ECFCB2A4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 955B35 second address: 955B39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 955B39 second address: 955B43 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA1ECFCB29Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B07F1 second address: 9B07F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0ADB second address: 9B0AED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA1ECFCB29Eh 0x0000000a jne 00007FA1ECFCB296h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0D70 second address: 9B0D74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0D74 second address: 9B0D78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0D78 second address: 9B0D7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0D7E second address: 9B0D84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0D84 second address: 9B0D8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0D8A second address: 9B0DB4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA1ECFCB29Fh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push ecx 0x0000000f jmp 00007FA1ECFCB29Fh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0DB4 second address: 9B0DBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B0DBD second address: 9B0DDF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA1ECFCB2A6h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B7137 second address: 9B7158 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 ja 00007FA1ED006906h 0x0000000c popad 0x0000000d je 00007FA1ED00690Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B7158 second address: 9B715C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B72C9 second address: 9B72CF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B72CF second address: 9B72E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA1ECFCB29Bh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B72E2 second address: 9B72E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B72E8 second address: 9B72EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B8920 second address: 9B8924 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B8924 second address: 9B8938 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA1ECFCB29Bh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B8C3B second address: 9B8C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B8C41 second address: 9B8C47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9B8C47 second address: 9B8C4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BCC58 second address: 9BCC6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jl 00007FA1ECFCB296h 0x0000000c je 00007FA1ECFCB296h 0x00000012 popad 0x00000013 push esi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BCC6E second address: 9BCCA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ED006913h 0x00000009 pop esi 0x0000000a jmp 00007FA1ED00690Ah 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA1ED00690Dh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BCCA0 second address: 9BCCA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BCCA8 second address: 9BCCAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BCCAC second address: 9BCCB2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC3D4 second address: 9BC3D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC3D8 second address: 9BC400 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jno 00007FA1ECFCB296h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC544 second address: 9BC548 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC548 second address: 9BC54C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC54C second address: 9BC552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC552 second address: 9BC568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 jmp 00007FA1ECFCB29Ch 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC568 second address: 9BC57F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b jc 00007FA1ED006906h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC6E1 second address: 9BC6E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC96B second address: 9BC971 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9BC971 second address: 9BC975 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C8BFD second address: 9C8C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C8C01 second address: 9C8C05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7226 second address: 9C722A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7367 second address: 9C7372 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7372 second address: 9C7382 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA1ED006906h 0x00000008 jnp 00007FA1ED006906h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7681 second address: 9C7686 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7BF1 second address: 9C7BF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7BF5 second address: 9C7C01 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jno 00007FA1ECFCB296h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7C01 second address: 9C7C0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FA1ED006906h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C7C0B second address: 9C7C20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA1ECFCB29Dh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9C8AE7 second address: 9C8AEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9CE735 second address: 9CE73B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1B04 second address: 9D1B25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FA1ED006915h 0x0000000b js 00007FA1ED006906h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1B25 second address: 9D1B36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1B36 second address: 9D1B5D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA1ED00690Fh 0x00000008 jmp 00007FA1ED006913h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1B5D second address: 9D1B81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jbe 00007FA1ECFCB2DEh 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA1ECFCB2A5h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1B81 second address: 9D1BA1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FA1ED006916h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1560 second address: 9D156A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FA1ECFCB296h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D156A second address: 9D1574 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA1ED006906h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1574 second address: 9D1595 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007FA1ECFCB296h 0x0000000e jmp 00007FA1ECFCB2A3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1595 second address: 9D1599 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1599 second address: 9D15B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 jnl 00007FA1ECFCB296h 0x0000000f ja 00007FA1ECFCB296h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D1856 second address: 9D185A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9D185A second address: 9D1860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DC788 second address: 9DC78C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DC78C second address: 9DC7AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA1ECFCB2A3h 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DC7AB second address: 9DC7AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DC7AF second address: 9DC7C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ECFCB29Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007FA1ECFCB29Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DC954 second address: 9DC960 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DC960 second address: 9DC966 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DF693 second address: 9DF6B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006916h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9DF107 second address: 9DF110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9E6613 second address: 9E6618 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9E6618 second address: 9E661E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9EAC30 second address: 9EAC45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006911h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FBF3C second address: 9FBF40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FBF40 second address: 9FBF75 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA1ED006906h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA1ED006917h 0x0000000f jo 00007FA1ED006918h 0x00000015 jmp 00007FA1ED00690Ch 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FA827 second address: 9FA82D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FA82D second address: 9FA831 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FA831 second address: 9FA835 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FA835 second address: 9FA856 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ED006916h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FA856 second address: 9FA85A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FA85A second address: 9FA85E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FA9E0 second address: 9FAA13 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jnl 00007FA1ECFCB296h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jp 00007FA1ECFCB296h 0x00000013 pushad 0x00000014 popad 0x00000015 pop eax 0x00000016 js 00007FA1ECFCB2C2h 0x0000001c pushad 0x0000001d push edi 0x0000001e pop edi 0x0000001f push edx 0x00000020 pop edx 0x00000021 jmp 00007FA1ECFCB2A0h 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FAA13 second address: 9FAA23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jnc 00007FA1ED006906h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FAE23 second address: 9FAE3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007FA1ECFCB2A1h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FB0E5 second address: 9FB102 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006919h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9FB102 second address: 9FB10D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A00EEF second address: A00F09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ED006916h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A00F09 second address: A00F48 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007FA1ECFCB29Bh 0x0000000f jl 00007FA1ECFCB296h 0x00000015 jmp 00007FA1ECFCB2A6h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A00A8F second address: A00A93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A0306B second address: A03072 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A0E4F1 second address: A0E4F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A0E4F6 second address: A0E4FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A0E35F second address: A0E38F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jnl 00007FA1ED006906h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007FA1ED006914h 0x00000014 jnl 00007FA1ED00690Eh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A112A2 second address: A112A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A112A6 second address: A112AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A112AC second address: A112B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A112B0 second address: A112C4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA1ED006906h 0x00000008 jns 00007FA1ED006906h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A112C4 second address: A112C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A13AC2 second address: A13AC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A13AC8 second address: A13AD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A13AD0 second address: A13AD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A0CD4B second address: A0CD51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A0CD51 second address: A0CD78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c je 00007FA1ED006906h 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 jmp 00007FA1ED00690Ch 0x00000019 popad 0x0000001a push ecx 0x0000001b pushad 0x0000001c popad 0x0000001d push ebx 0x0000001e pop ebx 0x0000001f pop ecx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A0CD78 second address: A0CD93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA1ECFCB2A5h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26FA8 second address: A26FC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006916h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26FC5 second address: A26FCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26FCB second address: A26FD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26FD1 second address: A2700C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA1ECFCB296h 0x0000000a popad 0x0000000b pop edi 0x0000000c pushad 0x0000000d push edx 0x0000000e jmp 00007FA1ECFCB2A4h 0x00000013 jmp 00007FA1ECFCB29Bh 0x00000018 pop edx 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c push edi 0x0000001d pop edi 0x0000001e jnl 00007FA1ECFCB296h 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26AAD second address: A26AD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FA1ED006906h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA1ED006918h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26AD2 second address: A26ADE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007FA1ECFCB296h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26C69 second address: A26C79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007FA1ED006906h 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26C79 second address: A26C8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26C8A second address: A26CF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jp 00007FA1ED006906h 0x00000009 push eax 0x0000000a pop eax 0x0000000b pop eax 0x0000000c push ebx 0x0000000d jmp 00007FA1ED006911h 0x00000012 jmp 00007FA1ED006916h 0x00000017 pop ebx 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d jmp 00007FA1ED006918h 0x00000022 push eax 0x00000023 pop eax 0x00000024 pushad 0x00000025 popad 0x00000026 popad 0x00000027 jmp 00007FA1ED006912h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A26CF3 second address: A26D09 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA1ECFCB29Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jns 00007FA1ECFCB296h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3EB07 second address: A3EB18 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a jl 00007FA1ED006906h 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3EB18 second address: A3EB1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3EB1D second address: A3EB23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3EE47 second address: A3EE4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3EE4D second address: A3EE51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3F11C second address: A3F124 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3F50B second address: A3F50F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3F965 second address: A3F969 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A3F969 second address: A3F96D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A42626 second address: A4262C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A4262C second address: A42630 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A4290A second address: A4290E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A4290E second address: A42929 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA1ED006906h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA1ED00690Eh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A42C6D second address: A42C71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A47620 second address: A4766B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA1ED00690Ah 0x0000000a pushad 0x0000000b jmp 00007FA1ED006918h 0x00000010 jmp 00007FA1ED00690Eh 0x00000015 popad 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FA1ED00690Eh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A4766B second address: A4766F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A4766F second address: A47681 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 js 00007FA1ED006906h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: A47681 second address: A47685 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C01AF second address: 51C01BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ED00690Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C01BF second address: 51C01CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c movsx edx, ax 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C01CF second address: 51C01D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C01D5 second address: 51C01D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C01D9 second address: 51C01FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA1ED006917h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C01FF second address: 51C0205 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C0205 second address: 51C020B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C020B second address: 51C022E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007FA1ECFCB29Ah 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA1ECFCB29Ah 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C022E second address: 51C0234 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0E33 second address: 51E0E68 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA1ECFCB2A3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0E68 second address: 51E0E6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0E6E second address: 51E0E8F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop edx 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA1ECFCB2A6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0E8F second address: 51E0EE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA1ED006911h 0x00000009 and cx, 2786h 0x0000000e jmp 00007FA1ED006911h 0x00000013 popfd 0x00000014 mov ecx, 780F6137h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov ebp, esp 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FA1ED006919h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0EE0 second address: 51E0EE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0EE6 second address: 51E0EEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0EEA second address: 51E0F07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA1ECFCB2A2h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0F07 second address: 51E0F0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0F0D second address: 51E0F11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180181 second address: 5180199 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ED006914h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0BDD second address: 51A0C63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FA1ECFCB2A1h 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FA1ECFCB2A3h 0x00000019 adc cx, 40BEh 0x0000001e jmp 00007FA1ECFCB2A9h 0x00000023 popfd 0x00000024 pushfd 0x00000025 jmp 00007FA1ECFCB2A0h 0x0000002a jmp 00007FA1ECFCB2A5h 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0C63 second address: 51A0CB5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, dh 0x00000005 pushfd 0x00000006 jmp 00007FA1ED006918h 0x0000000b adc ecx, 64BC0B48h 0x00000011 jmp 00007FA1ED00690Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov ebp, esp 0x0000001c jmp 00007FA1ED006916h 0x00000021 pop ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0CB5 second address: 51A0CB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0CB9 second address: 51A0CBF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0802 second address: 51A0806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0806 second address: 51A080C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A080C second address: 51A0811 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0723 second address: 51A0729 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0729 second address: 51A072D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A072D second address: 51A073C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A073C second address: 51A074D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A074D second address: 51A0753 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0753 second address: 51A0757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0757 second address: 51A075B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A075B second address: 51A077C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007FA1ECFCB29Fh 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A077C second address: 51A0780 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A044B second address: 51A04EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov al, dh 0x0000000d mov ah, 4Bh 0x0000000f popad 0x00000010 xchg eax, ebp 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FA1ECFCB2A1h 0x00000018 sbb si, 6246h 0x0000001d jmp 00007FA1ECFCB2A1h 0x00000022 popfd 0x00000023 call 00007FA1ECFCB2A0h 0x00000028 mov ax, D101h 0x0000002c pop esi 0x0000002d popad 0x0000002e mov ebp, esp 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 pushfd 0x00000034 jmp 00007FA1ECFCB2A6h 0x00000039 adc cx, 1948h 0x0000003e jmp 00007FA1ECFCB29Bh 0x00000043 popfd 0x00000044 jmp 00007FA1ECFCB2A8h 0x00000049 popad 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A04EE second address: 51A0555 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA1ED006911h 0x00000009 sbb cx, 0D16h 0x0000000e jmp 00007FA1ED006911h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FA1ED006910h 0x0000001a add al, 00000038h 0x0000001d jmp 00007FA1ED00690Bh 0x00000022 popfd 0x00000023 popad 0x00000024 pop edx 0x00000025 pop eax 0x00000026 pop ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FA1ED006915h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51B0330 second address: 51B0334 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51B0334 second address: 51B033A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51B033A second address: 51B0369 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FA1ECFCB2A0h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov al, A2h 0x00000015 mov edx, 305809ACh 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51B0369 second address: 51B03D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA1ED006910h 0x00000009 jmp 00007FA1ED006915h 0x0000000e popfd 0x0000000f pushfd 0x00000010 jmp 00007FA1ED006910h 0x00000015 sub ax, D628h 0x0000001a jmp 00007FA1ED00690Bh 0x0000001f popfd 0x00000020 popad 0x00000021 pop edx 0x00000022 pop eax 0x00000023 xchg eax, ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 mov dx, 6B96h 0x0000002b call 00007FA1ED006917h 0x00000030 pop esi 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51B03D9 second address: 51B0452 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, di 0x00000006 mov cx, bx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e pushad 0x0000000f call 00007FA1ECFCB2A9h 0x00000014 pushfd 0x00000015 jmp 00007FA1ECFCB2A0h 0x0000001a xor si, FD48h 0x0000001f jmp 00007FA1ECFCB29Bh 0x00000024 popfd 0x00000025 pop esi 0x00000026 jmp 00007FA1ECFCB2A9h 0x0000002b popad 0x0000002c pop ebp 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 jmp 00007FA1ECFCB29Fh 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0D2B second address: 51E0D30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0D30 second address: 51E0D35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0D35 second address: 51E0DAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FA1ED006913h 0x0000000a or si, 484Eh 0x0000000f jmp 00007FA1ED006919h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 jmp 00007FA1ED006911h 0x0000001e xchg eax, ebp 0x0000001f jmp 00007FA1ED00690Eh 0x00000024 mov ebp, esp 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FA1ED006917h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0DAB second address: 51E0DC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 mov al, bl 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov cx, di 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C05C2 second address: 51C0604 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FA1ED00690Bh 0x00000008 add ecx, 6744A98Eh 0x0000000e jmp 00007FA1ED006919h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FA1ED00690Dh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A063E second address: 51A0644 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0644 second address: 51A064A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A064A second address: 51A064E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A064E second address: 51A065D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A065D second address: 51A0661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0661 second address: 51A0667 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0667 second address: 51A066D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A066D second address: 51A0671 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A0671 second address: 51A06A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA1ECFCB2A5h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51A06A2 second address: 51A06A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C00C0 second address: 51C00D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ECFCB29Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C00D0 second address: 51C010B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jmp 00007FA1ED00690Ch 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov ebx, 1F4432F0h 0x00000019 call 00007FA1ED006919h 0x0000001e pop esi 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C033E second address: 51C03C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA1ECFCB2A7h 0x00000009 jmp 00007FA1ECFCB2A3h 0x0000000e popfd 0x0000000f call 00007FA1ECFCB2A8h 0x00000014 pop esi 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 jmp 00007FA1ECFCB29Eh 0x0000001e mov dword ptr [esp], ebp 0x00000021 jmp 00007FA1ECFCB2A0h 0x00000026 mov ebp, esp 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FA1ECFCB2A7h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C03C6 second address: 51C03CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51C03CC second address: 51C03D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0759 second address: 51E075F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E075F second address: 51E0796 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FA25ED0E495h 0x0000000e pushad 0x0000000f mov ax, di 0x00000012 mov dh, A7h 0x00000014 popad 0x00000015 mov ecx, eax 0x00000017 pushad 0x00000018 movzx eax, dx 0x0000001b mov edi, 7B92714Eh 0x00000020 popad 0x00000021 xor eax, dword ptr [ebp+08h] 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FA1ECFCB2A1h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0796 second address: 51E079B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E079B second address: 51E07AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov cx, di 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a and ecx, 1Fh 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E07AE second address: 51E07B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E07B2 second address: 51E07C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E07C2 second address: 51E07F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop esi 0x00000005 movsx ebx, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ror eax, cl 0x0000000d jmp 00007FA1ED006914h 0x00000012 leave 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FA1ED00690Ah 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E07F2 second address: 51E07F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E07F6 second address: 51E07FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E07FC second address: 51E0820 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ebx 0x00000005 mov si, B2FFh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c retn 0004h 0x0000000f nop 0x00000010 mov esi, eax 0x00000012 lea eax, dword ptr [ebp-08h] 0x00000015 xor esi, dword ptr [007A2014h] 0x0000001b push eax 0x0000001c push eax 0x0000001d push eax 0x0000001e lea eax, dword ptr [ebp-10h] 0x00000021 push eax 0x00000022 call 00007FA1F1A4BAB1h 0x00000027 push FFFFFFFEh 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FA1ECFCB2A1h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0820 second address: 51E0826 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0826 second address: 51E082A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E082A second address: 51E082E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E082E second address: 51E083D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c movsx ebx, si 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E083D second address: 51E0865 instructions: 0x00000000 rdtsc 0x00000002 mov esi, 48AA9B73h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dh, al 0x0000000b popad 0x0000000c ret 0x0000000d nop 0x0000000e push eax 0x0000000f call 00007FA1F1A87159h 0x00000014 mov edi, edi 0x00000016 pushad 0x00000017 pushad 0x00000018 mov dx, cx 0x0000001b mov dx, ax 0x0000001e popad 0x0000001f popad 0x00000020 xchg eax, ebp 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007FA1ED00690Ah 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51E0865 second address: 51E0874 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190008 second address: 519000C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 519000C second address: 5190022 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190022 second address: 5190094 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop eax 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esp 0x0000000b pushad 0x0000000c movzx esi, bx 0x0000000f mov cx, di 0x00000012 popad 0x00000013 mov dword ptr [esp], ebp 0x00000016 pushad 0x00000017 mov ecx, edi 0x00000019 pushad 0x0000001a push ebx 0x0000001b pop esi 0x0000001c popad 0x0000001d popad 0x0000001e mov ebp, esp 0x00000020 pushad 0x00000021 jmp 00007FA1ED006916h 0x00000026 push esi 0x00000027 mov si, di 0x0000002a pop edi 0x0000002b popad 0x0000002c and esp, FFFFFFF8h 0x0000002f jmp 00007FA1ED006918h 0x00000034 xchg eax, ecx 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007FA1ED006917h 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190094 second address: 51900E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b call 00007FA1ECFCB2A7h 0x00000010 mov cx, BEDFh 0x00000014 pop ecx 0x00000015 mov dx, CA18h 0x00000019 popad 0x0000001a xchg eax, ecx 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FA1ECFCB29Ah 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51900E1 second address: 519011D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop eax 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FA1ED00690Bh 0x00000014 sub cl, FFFFFF8Eh 0x00000017 jmp 00007FA1ED006919h 0x0000001c popfd 0x0000001d mov ax, 8697h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 519011D second address: 5190123 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190123 second address: 5190127 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190127 second address: 519012B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 519012B second address: 5190172 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebx 0x0000000b pushad 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FA1ED006917h 0x00000013 or ecx, 7EE4864Eh 0x00000019 jmp 00007FA1ED006919h 0x0000001e popfd 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190172 second address: 51901D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007FA1ECFCB29Eh 0x0000000b and si, 12C8h 0x00000010 jmp 00007FA1ECFCB29Bh 0x00000015 popfd 0x00000016 popad 0x00000017 mov ebx, dword ptr [ebp+10h] 0x0000001a pushad 0x0000001b movzx ecx, bx 0x0000001e mov edx, 7BC6C1A4h 0x00000023 popad 0x00000024 push esp 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007FA1ECFCB2A5h 0x0000002e and esi, 61608296h 0x00000034 jmp 00007FA1ECFCB2A1h 0x00000039 popfd 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51901D8 second address: 51901F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], esi 0x0000000c pushad 0x0000000d push eax 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 mov ebx, 5B15A9E8h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51901F6 second address: 5190250 instructions: 0x00000000 rdtsc 0x00000002 call 00007FA1ECFCB2A1h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+08h] 0x0000000e pushad 0x0000000f mov dl, B7h 0x00000011 mov si, BD65h 0x00000015 popad 0x00000016 xchg eax, edi 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c pushfd 0x0000001d jmp 00007FA1ECFCB2A3h 0x00000022 xor ch, FFFFFF8Eh 0x00000025 jmp 00007FA1ECFCB2A9h 0x0000002a popfd 0x0000002b popad 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190250 second address: 5190261 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov al, dh 0x00000005 push esi 0x00000006 pop edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190261 second address: 5190265 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190265 second address: 519026B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 519026B second address: 5190345 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a pushad 0x0000000b pushad 0x0000000c mov cx, C1B9h 0x00000010 mov cl, C0h 0x00000012 popad 0x00000013 mov bh, 5Ah 0x00000015 popad 0x00000016 test esi, esi 0x00000018 jmp 00007FA1ECFCB29Ah 0x0000001d je 00007FA25ED5960Ah 0x00000023 pushad 0x00000024 push ecx 0x00000025 pushad 0x00000026 popad 0x00000027 pop edx 0x00000028 jmp 00007FA1ECFCB2A8h 0x0000002d popad 0x0000002e cmp dword ptr [esi+08h], DDEEDDEEh 0x00000035 pushad 0x00000036 push edx 0x00000037 mov ah, 79h 0x00000039 pop edi 0x0000003a popad 0x0000003b je 00007FA25ED595EFh 0x00000041 pushad 0x00000042 call 00007FA1ECFCB29Eh 0x00000047 pushfd 0x00000048 jmp 00007FA1ECFCB2A2h 0x0000004d jmp 00007FA1ECFCB2A5h 0x00000052 popfd 0x00000053 pop esi 0x00000054 pushfd 0x00000055 jmp 00007FA1ECFCB2A1h 0x0000005a or esi, 44E20056h 0x00000060 jmp 00007FA1ECFCB2A1h 0x00000065 popfd 0x00000066 popad 0x00000067 mov edx, dword ptr [esi+44h] 0x0000006a push eax 0x0000006b push edx 0x0000006c push eax 0x0000006d push edx 0x0000006e push eax 0x0000006f push edx 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190345 second address: 5190349 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190349 second address: 519034D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 519034D second address: 5190353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190353 second address: 5190385 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 or edx, dword ptr [ebp+0Ch] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA1ECFCB2A7h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190385 second address: 51903C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, cx 0x00000006 mov ch, A1h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test edx, 61000000h 0x00000011 jmp 00007FA1ED006913h 0x00000016 jne 00007FA25ED94BE5h 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FA1ED006915h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51903C6 second address: 51903CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51903CC second address: 51903E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test byte ptr [esi+48h], 00000001h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov dl, cl 0x00000011 push edi 0x00000012 pop esi 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51903E0 second address: 51903E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51903E6 second address: 51903EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51903EA second address: 51903EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51903EE second address: 519042E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FA25ED94BB1h 0x0000000e jmp 00007FA1ED00690Ch 0x00000013 test bl, 00000007h 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FA1ED00690Eh 0x0000001d or ah, 00000058h 0x00000020 jmp 00007FA1ED00690Bh 0x00000025 popfd 0x00000026 push eax 0x00000027 push edx 0x00000028 push esi 0x00000029 pop edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180739 second address: 5180775 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FA1ECFCB2A0h 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FA1ECFCB2A7h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180775 second address: 518079A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 4CAB982Ah 0x00000008 mov dx, 0CF6h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f and esp, FFFFFFF8h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FA1ED00690Fh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 518079A second address: 518079E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 518079E second address: 51807A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51807A4 second address: 518084F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007FA1ECFCB2A0h 0x0000000f push eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FA1ECFCB2A1h 0x00000017 sbb eax, 0BD76266h 0x0000001d jmp 00007FA1ECFCB2A1h 0x00000022 popfd 0x00000023 pushfd 0x00000024 jmp 00007FA1ECFCB2A0h 0x00000029 and cx, D208h 0x0000002e jmp 00007FA1ECFCB29Bh 0x00000033 popfd 0x00000034 popad 0x00000035 xchg eax, ebx 0x00000036 pushad 0x00000037 movzx esi, bx 0x0000003a mov ecx, edi 0x0000003c popad 0x0000003d push esi 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 jmp 00007FA1ECFCB2A5h 0x00000046 call 00007FA1ECFCB2A0h 0x0000004b pop eax 0x0000004c popad 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 518084F second address: 51808B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006910h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], esi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FA1ED00690Dh 0x00000015 sub ecx, 239B27E6h 0x0000001b jmp 00007FA1ED006911h 0x00000020 popfd 0x00000021 pushfd 0x00000022 jmp 00007FA1ED006910h 0x00000027 and al, FFFFFF88h 0x0000002a jmp 00007FA1ED00690Bh 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51808B0 second address: 51808B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51808B6 second address: 51808BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51808BA second address: 51808E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [ebp+08h] 0x0000000b jmp 00007FA1ECFCB2A7h 0x00000010 sub ebx, ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov edx, ecx 0x00000017 movzx esi, bx 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51808E7 second address: 5180936 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, 65768AEBh 0x00000008 mov di, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test esi, esi 0x00000010 jmp 00007FA1ED00690Ah 0x00000015 je 00007FA25ED9C393h 0x0000001b pushad 0x0000001c mov ecx, 4192428Dh 0x00000021 pushfd 0x00000022 jmp 00007FA1ED00690Ah 0x00000027 and eax, 09E832A8h 0x0000002d jmp 00007FA1ED00690Bh 0x00000032 popfd 0x00000033 popad 0x00000034 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000003b pushad 0x0000003c pushad 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180936 second address: 5180952 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA1ECFCB2A0h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c mov ecx, 01323687h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180952 second address: 518096F instructions: 0x00000000 rdtsc 0x00000002 mov cl, B4h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ecx, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA1ED006912h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 518096F second address: 5180988 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 mov di, 1B80h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c je 00007FA25ED60CBEh 0x00000012 pushad 0x00000013 push edx 0x00000014 mov bl, cl 0x00000016 pop ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180988 second address: 51809A7 instructions: 0x00000000 rdtsc 0x00000002 mov ax, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 test byte ptr [76FA6968h], 00000002h 0x0000000f pushad 0x00000010 mov ebx, esi 0x00000012 popad 0x00000013 jne 00007FA25ED9C321h 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51809A7 second address: 51809AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51809AB second address: 51809B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51809B1 second address: 5180A76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 4409E9C5h 0x00000008 pushfd 0x00000009 jmp 00007FA1ECFCB2A2h 0x0000000e adc ah, 00000058h 0x00000011 jmp 00007FA1ECFCB29Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov edx, dword ptr [ebp+0Ch] 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FA1ECFCB2A4h 0x00000024 or eax, 1A48E9B8h 0x0000002a jmp 00007FA1ECFCB29Bh 0x0000002f popfd 0x00000030 movzx ecx, bx 0x00000033 popad 0x00000034 push ebx 0x00000035 pushad 0x00000036 mov edx, ecx 0x00000038 pushad 0x00000039 mov di, ax 0x0000003c mov eax, 64F96BFBh 0x00000041 popad 0x00000042 popad 0x00000043 mov dword ptr [esp], ebx 0x00000046 jmp 00007FA1ECFCB29Eh 0x0000004b xchg eax, ebx 0x0000004c pushad 0x0000004d pushfd 0x0000004e jmp 00007FA1ECFCB29Ah 0x00000053 sub si, 0E78h 0x00000058 jmp 00007FA1ECFCB29Bh 0x0000005d popfd 0x0000005e popad 0x0000005f push eax 0x00000060 jmp 00007FA1ECFCB2A9h 0x00000065 xchg eax, ebx 0x00000066 push eax 0x00000067 push edx 0x00000068 jmp 00007FA1ECFCB29Dh 0x0000006d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180A76 second address: 5180A7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180B2B second address: 5180B5B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA1ECFCB2A0h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5180B5B second address: 5180B6A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190E55 second address: 5190E72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190E72 second address: 5190E97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA1ED006917h 0x00000008 mov edi, ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop ebp 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190E97 second address: 5190E9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190BA3 second address: 5190BB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ED00690Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190BB5 second address: 5190C0A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FA1ECFCB2A6h 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007FA1ECFCB29Dh 0x0000001c or ax, 7806h 0x00000021 jmp 00007FA1ECFCB2A1h 0x00000026 popfd 0x00000027 mov bh, cl 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5190C0A second address: 5190C27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA1ED006919h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5200E53 second address: 5200E59 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5200E59 second address: 5200E78 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA1ED006911h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5200E78 second address: 5200E7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 52001FF second address: 5200205 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5200205 second address: 5200209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5200209 second address: 5200255 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED00690Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov bx, A5D0h 0x00000013 pushfd 0x00000014 jmp 00007FA1ED006919h 0x00000019 xor si, 3256h 0x0000001e jmp 00007FA1ED006911h 0x00000023 popfd 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5200255 second address: 520025B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 520025B second address: 520025F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 520025F second address: 5200285 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB2A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d movsx edi, si 0x00000010 popad 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5200285 second address: 520028B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 520028B second address: 52002CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ECFCB29Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FA1ECFCB2A8h 0x00000014 add esi, 5522C868h 0x0000001a jmp 00007FA1ECFCB29Bh 0x0000001f popfd 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 52002CE second address: 5200322 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA1ED006919h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov si, bx 0x00000010 pushfd 0x00000011 jmp 00007FA1ED00690Fh 0x00000016 xor ax, F90Eh 0x0000001b jmp 00007FA1ED006919h 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc |