Source: 580c9354ec.exe, 0000001F.00000003.4358124840.0000000001215000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/ |
Source: 580c9354ec.exe, 0000001F.00000003.4347342206.0000000001215000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.4360295909.00000000059D2000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.4358124840.0000000001215000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: 580c9354ec.exe, 0000001F.00000003.4347342206.0000000001215000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.4358124840.0000000001215000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/off/def.exe? |
Source: 580c9354ec.exe, 0000001F.00000003.4358124840.0000000001215000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.16/steam/random.exe |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp, 9f6ea82062.exe, 00000020.00000002.3929798314.000000000094E000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000024.00000002.4260064567.000000000164D000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000024.00000002.4260064567.00000000015FB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206 |
Source: 9f6ea82062.exe, 00000024.00000002.4260064567.000000000164D000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000024.00000002.4260064567.00000000015FB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/ |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/freebl3.dll |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/mozglue.dll |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/mozglue.dll. |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009A6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/msvcp140.dll |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.3929798314.000000000094E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/nss3.dll |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.000000000094E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/nss3.dllConneb |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/nss3.dllllj |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009A6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/softokn3.dll |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009A6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/softokn3.dllg |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/sqlite3.dll |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/sqlite3.dllF |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/68b591d6548ec281/vcruntime140.dll |
Source: 9f6ea82062.exe, 00000024.00000002.4260064567.000000000164D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/9 |
Source: 9f6ea82062.exe, 00000024.00000002.4260064567.000000000164D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/Local |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.3929798314.000000000094E000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000024.00000002.4260064567.000000000164D000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000024.00000002.4260064567.00000000015FB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php |
Source: 9f6ea82062.exe, 00000024.00000002.4260064567.000000000164D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php/a |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php34 |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php8 |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009A6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php; |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.000000000094E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpBrowser |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009C1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpP5 |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpation |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpe13b062b4c5e95f4989d6bd1e553 |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpinit.exe |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpl |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009A6000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000024.00000002.4260064567.000000000164D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpo |
Source: 9f6ea82062.exe, 00000020.00000002.3929798314.00000000009A6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206/e |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: http://185.215.113.206/form-data; |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: http://185.215.113.206FCG |
Source: 9f6ea82062.exe, 00000024.00000002.4260064567.00000000015FB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.206b |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: http://185.215.113.206c4becf79229cb002.phpion: |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php8001 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: 17ce3a84e4.exe, 0000001B.00000003.4498901768.000000000152C000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000002.4524131042.000000000152C000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.mw |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4278061535.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4278061535.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0# |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4278061535.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4278061535.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: SurveillanceWalls.exe, 0000000E.00000002.2860938966.0000000000409000.00000002.00000001.01000000.0000000B.sdmp, SurveillanceWalls.exe, 0000000E.00000000.2852400591.0000000000409000.00000002.00000001.01000000.0000000B.sdmp |
String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.comodoca.com0 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4278061535.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.sectigo.com0 |
Source: SurveillanceWalls.exe, 0000000E.00000002.2860963000.0000000000420000.00000004.00000001.01000000.0000000B.sdmp, Sale.com, 00000018.00000000.2879703042.0000000000855000.00000002.00000001.01000000.0000000D.sdmp |
String found in binary or memory: http://www.autoitscript.com/autoit3/X |
Source: 580c9354ec.exe, 0000001F.00000003.3614760975.00000000011AA000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3572256199.00000000011AA000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3870761939.00000000011AA000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3803442222.00000000011AA000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3927069843.00000000011AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.microsoft.x |
Source: 9f6ea82062.exe, 00000020.00000002.4069578254.000000006C0DD000.00000002.00000001.01000000.0000001E.sdmp |
String found in binary or memory: http://www.mozilla.com/en-US/blocklist/ |
Source: 9f6ea82062.exe, 00000020.00000002.4047572344.0000000005794000.00000004.00000020.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4066981270.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://www.sqlite.org/copyright.html. |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.c.lencr.org/0 |
Source: EUCyhuW.exe, 00000009.00000003.2853484209.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3378806018.000000000397D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3603169180.0000000005A83000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://x1.i.lencr.org/0 |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: EUCyhuW.exe, 00000009.00000003.2856083987.000000000378F000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3385290739.000000000390D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3641823591.0000000005A5F000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: EUCyhuW.exe, 00000009.00000003.2856083987.000000000378F000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3385290739.000000000390D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3641823591.0000000005A5F000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: EUCyhuW.exe, 00000009.00000003.2856083987.000000000378F000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3385290739.000000000390D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3641823591.0000000005A5F000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: EUCyhuW.exe, 00000009.00000003.2856083987.000000000378F000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3385290739.000000000390D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3641823591.0000000005A5F000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: 580c9354ec.exe, 0000001F.00000003.4358124840.0000000001215000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3797185380.0000000001213000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/ |
Source: EUCyhuW.exe, 00000009.00000002.3138189518.0000000000EF5000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.3093948172.0000000000EF5000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/% |
Source: EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E97000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/( |
Source: 580c9354ec.exe, 0000001F.00000003.3535631558.0000000005A4E000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3535225334.0000000005A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/- |
Source: EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E97000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/. |
Source: EUCyhuW.exe, 00000009.00000003.2852327758.0000000003784000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2852015292.0000000003784000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2888145590.0000000003784000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2852833290.0000000003784000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/90BH |
Source: EUCyhuW.exe, 00000009.00000003.2828355789.0000000003773000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/JJFf |
Source: EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E97000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/Q |
Source: EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E97000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/V |
Source: EUCyhuW.exe, 00000009.00000003.2851829493.0000000003787000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.3093424754.0000000000F03000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E69000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E72000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2852265070.000000000378A000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2852327758.0000000003773000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000002.3138189518.0000000000F03000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2913644011.0000000000F03000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000002.3138169097.0000000000EE5000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2913722505.0000000000EA9000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E97000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2878424864.0000000003791000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.3093424754.0000000000E97000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.3093948172.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2877959925.0000000003791000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2852015292.0000000003773000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2930693716.0000000000F03000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2913252442.0000000000E97000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2852833290.0000000003773000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3694965286.0000000001225000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3614760975.00000000011AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/api |
Source: 580c9354ec.exe, 0000001F.00000003.3694965286.0000000001225000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3684252207.0000000001225000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3763354814.0000000001224000.00000004.00000020.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3669275426.0000000001224000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/api/ |
Source: EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E97000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/apiH |
Source: EUCyhuW.exe, 00000009.00000003.3093424754.0000000000F03000.00000004.00000020.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000002.3138189518.0000000000F03000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/apiLb |
Source: 580c9354ec.exe, 0000001F.00000003.3927069843.00000000011AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/apij |
Source: EUCyhuW.exe, 00000009.00000003.2804303481.0000000000E72000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://discokeyus.lat/apis |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: 17ce3a84e4.exe, 0000001B.00000002.4524131042.00000000014CF000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000003.4498901768.00000000014CF000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000003.4498901768.00000000014E9000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000002.4524131042.00000000014E9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://fieldhitty.click/ |
Source: 17ce3a84e4.exe, 0000001B.00000002.4524131042.00000000014E9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://fieldhitty.click/api |
Source: 17ce3a84e4.exe, 0000001B.00000003.4498901768.00000000014E9000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000002.4524131042.00000000014E9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://fieldhitty.click/api& |
Source: 17ce3a84e4.exe, 0000001B.00000003.4488835946.00000000014C6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://fieldhitty.click/api9 |
Source: 17ce3a84e4.exe, 0000001B.00000002.4522542200.00000000014BC000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000003.4488835946.00000000014BC000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://fieldhitty.click/apii |
Source: 17ce3a84e4.exe, 0000001B.00000003.4498901768.00000000014E9000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000002.4524131042.00000000014E9000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://fieldhitty.click/c |
Source: 17ce3a84e4.exe, 0000001B.00000002.4524131042.00000000014CF000.00000004.00000020.00020000.00000000.sdmp, 17ce3a84e4.exe, 0000001B.00000003.4498901768.00000000014CF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://fieldhitty.click:443/api |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005BB0000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4281279423.0000000005BB0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://github.com |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005BB0000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4281279423.0000000005BB0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Urijas/moperats/raw/refs/heads/main/biyjdfjadaw.exe |
Source: 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: 412ec13ac5.exe, 0000001E.00000003.3207231180.000000000111D000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3373433430.00000000038FE000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3622898084.000000000111D000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3298472752.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3551750660.000000000117D000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3412770399.0000000003905000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3592146204.000000000117E000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000002.3657261192.000000000111D000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3412261797.00000000038FC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3298172128.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000002.3658768402.000000000117E000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3374828427.0000000003905000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3630270875.000000000117E000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3593252563.000000000111D000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3548292393.0000000001176000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/ |
Source: 412ec13ac5.exe, 0000001E.00000003.3179102375.0000000001139000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/. |
Source: 412ec13ac5.exe, 0000001E.00000003.3207422516.0000000001138000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3207231180.000000000111D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/2 |
Source: 412ec13ac5.exe, 0000001E.00000003.3207422516.0000000001138000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3207231180.000000000111D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/M |
Source: 412ec13ac5.exe, 0000001E.00000003.3375729196.0000000003907000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/P |
Source: 412ec13ac5.exe, 0000001E.00000003.3630270875.000000000118F000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3207231180.000000000111D000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3589106795.000000000118F000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3298372606.0000000001196000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3467586885.000000000118F000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000002.3658768402.000000000117E000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3548508878.000000000118F000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3630270875.000000000117E000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3593252563.000000000111D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/api |
Source: 412ec13ac5.exe, 0000001E.00000003.3632525311.0000000001139000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3622898084.0000000001139000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000002.3658232025.0000000001139000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/api$ |
Source: 412ec13ac5.exe, 0000001E.00000003.3207422516.0000000001138000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3207231180.000000000111D000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/api- |
Source: 412ec13ac5.exe, 0000001E.00000002.3659052898.000000000118F000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3630270875.000000000118F000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/apiDV |
Source: 412ec13ac5.exe, 0000001E.00000002.3659052898.000000000118F000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3630270875.000000000118F000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/apiIV |
Source: 412ec13ac5.exe, 0000001E.00000003.3551750660.000000000117D000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3592146204.000000000117E000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3548292393.0000000001176000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click/pi |
Source: 412ec13ac5.exe, 0000001E.00000003.3438661334.000000000390E000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3596871072.000000000390E000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3452315135.000000000390E000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3480531158.000000000390E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click:443/api |
Source: 412ec13ac5.exe, 0000001E.00000003.3412770399.000000000390E000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3548818763.000000000390E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://pancakedipyps.click:443/api( |
Source: skotes.exe, 00000006.00000003.4278061535.0000000005B63000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000006.00000003.4278061535.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001C.00000002.3169413863.0000000000EDE000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://sectigo.com/CPS0 |
Source: 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: 580c9354ec.exe, 0000001F.00000003.3627062430.00000000060B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL |
Source: EUCyhuW.exe, 00000009.00000003.2856083987.000000000378F000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3385290739.000000000390D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3641823591.0000000005A5F000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: EUCyhuW.exe, 00000009.00000003.2856083987.000000000378F000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3385290739.000000000390D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3641823591.0000000005A5F000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000002.4054758953.000000000B8E1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: EUCyhuW.exe, 00000009.00000003.2805310164.0000000003728000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805076562.000000000372B000.00000004.00000800.00020000.00000000.sdmp, EUCyhuW.exe, 00000009.00000003.2805196036.0000000003728000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3245396945.00000000038AC000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3250034677.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3249885987.00000000038A9000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3466602606.0000000005A0D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3467960261.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3476918307.0000000005A0A000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3531478078.00000000009F6000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000AD4000.00000040.00000001.01000000.00000012.sdmp, 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: https://www.mozilla.org/about/ |
Source: 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: https://www.mozilla.org/about/t.exe |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000AD4000.00000040.00000001.01000000.00000012.sdmp, 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000BB7000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: https://www.mozilla.org/contribute/ |
Source: 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6 |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000AD4000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ |
Source: EUCyhuW.exe, 00000009.00000003.2855580387.0000000003A15000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3382726374.0000000003B9D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3627062430.00000000060B2000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: EUCyhuW.exe, 00000009.00000003.2855580387.0000000003A15000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3382726374.0000000003B9D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3627062430.00000000060B2000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: 9f6ea82062.exe, 00000020.00000002.3942624190.0000000000AD4000.00000040.00000001.01000000.00000012.sdmp |
String found in binary or memory: https://www.mozilla.org/privacy/firefox/ |
Source: EUCyhuW.exe, 00000009.00000003.2855580387.0000000003A15000.00000004.00000800.00020000.00000000.sdmp, 412ec13ac5.exe, 0000001E.00000003.3382726374.0000000003B9D000.00000004.00000800.00020000.00000000.sdmp, 580c9354ec.exe, 0000001F.00000003.3627062430.00000000060B2000.00000004.00000800.00020000.00000000.sdmp, 9f6ea82062.exe, 00000020.00000003.3834740498.000000000BA2B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: firefox.exe, 00000031.00000002.3493824464.000001D0EF6B0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000031.00000002.3494265817.000001D0F10A0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000031.00000003.3492499042.000001D0EF6CD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000031.00000002.3493939340.000001D0EF6D2000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000032.00000003.3804628103.000000000177B000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000032.00000003.3808584450.000000000177B000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000032.00000003.3727043148.0000000001577000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000032.00000003.3830810642.000000000177B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd |
Source: firefox.exe, 00000031.00000002.3493824464.000001D0EF6BA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser |
Source: 51ecf08926.exe, 00000021.00000003.3535624044.00000000016DF000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000021.00000003.3527139592.00000000016DF000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000021.00000003.3405370218.00000000016DA000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000021.00000003.3581429163.00000000016F2000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000021.00000003.3587715027.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000021.00000003.3490233583.00000000016DA000.00000004.00000020.00020000.00000000.sdmp, 51ecf08926.exe, 00000021.00000002.3629103561.00000000016FA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdQ |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mstask.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: dui70.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: duser.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: chartv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: oleacc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: atlthunk.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.fileexplorer.common.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: explorerframe.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: webio.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: shfolder.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: propsys.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: riched20.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: usp10.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: msls31.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: textinputframework.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: coreuicomponents.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: coremessaging.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: ntmarta.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: textshaping.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: edputil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: urlmon.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: iertutil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: srvcli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: netutils.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: windows.staterepositoryps.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: appresolver.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: bcp47langs.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: slc.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: sppc.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: onecorecommonproxystub.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019557001\SurveillanceWalls.exe |
Section loaded: onecoreuapcommonproxystub.dll |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: apphelp.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: wsock32.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: mpr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: wininet.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: webio.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: wbemcomn.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Windows\SysWOW64\choice.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019563001\hYW0tgm.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019563001\hYW0tgm.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: webio.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019594001\17ce3a84e4.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: webio.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: webio.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: schannel.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: mskeyprotect.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ncryptsslp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: msasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: gpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: amsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: wininet.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: rstrtmgr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: ncrypt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: ntasn1.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: iertutil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: winhttp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: winnsi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: urlmon.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: srvcli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: netutils.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: dpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: ntmarta.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: mozglue.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: wsock32.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: vcruntime140.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: msvcp140.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019597001\9f6ea82062.exe |
Section loaded: vcruntime140.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wsock32.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winmm.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mpr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wininet.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: napinsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: wshbth.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: nlaapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: winrnr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\1019598001\51ecf08926.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: version.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\SysWOW64\taskkill.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108779D second address: 10877A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F2D3 second address: 109F2D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F2D7 second address: 109F2F0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F8F4CECCCE6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jg 00007F8F4CECCCE6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F2F0 second address: 109F30A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnp 00007F8F4C50240Ch 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F5EE second address: 109F5F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F5F8 second address: 109F607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jl 00007F8F4C502406h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F76A second address: 109F770 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F770 second address: 109F774 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F774 second address: 109F778 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F778 second address: 109F784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109F784 second address: 109F788 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109FA5F second address: 109FA97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F8F4C502417h 0x0000000b popad 0x0000000c push esi 0x0000000d jnl 00007F8F4C502406h 0x00000013 pop esi 0x00000014 popad 0x00000015 pushad 0x00000016 push edi 0x00000017 jnl 00007F8F4C502406h 0x0000001d pop edi 0x0000001e push eax 0x0000001f push edx 0x00000020 jo 00007F8F4C502406h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109FA97 second address: 109FA9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109FBDE second address: 109FBE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109FBE4 second address: 109FBE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109FBE8 second address: 109FBF4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jnc 00007F8F4C502406h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A17F2 second address: 10A17F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A17F8 second address: 10A17FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A17FC second address: 10A18C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnp 00007F8F4CECCCF9h 0x0000000f jmp 00007F8F4CECCCF3h 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 push esi 0x00000019 jmp 00007F8F4CECCCF9h 0x0000001e pop esi 0x0000001f mov eax, dword ptr [eax] 0x00000021 push ecx 0x00000022 push eax 0x00000023 push esi 0x00000024 pop esi 0x00000025 pop eax 0x00000026 pop ecx 0x00000027 mov dword ptr [esp+04h], eax 0x0000002b push ebx 0x0000002c pushad 0x0000002d jmp 00007F8F4CECCCF8h 0x00000032 js 00007F8F4CECCCE6h 0x00000038 popad 0x00000039 pop ebx 0x0000003a pop eax 0x0000003b mov dx, 72DBh 0x0000003f and ecx, dword ptr [ebp+122D2CEDh] 0x00000045 lea ebx, dword ptr [ebp+12456477h] 0x0000004b jmp 00007F8F4CECCCEDh 0x00000050 xchg eax, ebx 0x00000051 jbe 00007F8F4CECCCECh 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b jmp 00007F8F4CECCCF5h 0x00000060 jmp 00007F8F4CECCCF1h 0x00000065 popad 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A18C1 second address: 10A18CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F8F4C502406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A18F8 second address: 10A18FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A18FC second address: 10A191A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007F8F4C50240Ch 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jne 00007F8F4C502408h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A191A second address: 10A1951 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov dword ptr [ebp+122D2F75h], edx 0x00000010 push 00000000h 0x00000012 cmc 0x00000013 call 00007F8F4CECCCE9h 0x00000018 jp 00007F8F4CECCCEEh 0x0000001e push eax 0x0000001f pushad 0x00000020 pushad 0x00000021 push ebx 0x00000022 pop ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A1951 second address: 10A1982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F8F4C50240Eh 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F8F4C502413h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A1982 second address: 10A19A6 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8F4CECCCE8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f jmp 00007F8F4CECCCF2h 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A19A6 second address: 10A19B0 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8F4C50240Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A19B0 second address: 10A19C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A19C0 second address: 10A19C6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A19C6 second address: 10A1A42 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 mov dword ptr [ebp+122D3611h], edi 0x0000000f push 00000003h 0x00000011 jmp 00007F8F4CECCCEDh 0x00000016 push 00000000h 0x00000018 call 00007F8F4CECCCF8h 0x0000001d jne 00007F8F4CECCCECh 0x00000023 xor ecx, 5EAD6C00h 0x00000029 pop edi 0x0000002a jmp 00007F8F4CECCCEEh 0x0000002f push 00000003h 0x00000031 jmp 00007F8F4CECCCF9h 0x00000036 push 73BBFCF5h 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e jl 00007F8F4CECCCE6h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A1A42 second address: 10A1A7D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 add dword ptr [esp], 4C44030Bh 0x0000000e mov dword ptr [ebp+122D1E61h], eax 0x00000014 lea ebx, dword ptr [ebp+12456482h] 0x0000001a jp 00007F8F4C50240Ch 0x00000020 push eax 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F8F4C502411h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B3EB4 second address: 10B3EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 jmp 00007F8F4CECCCF4h 0x0000000b pop ebx 0x0000000c popad 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 js 00007F8F4CECCCE6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3E4D second address: 10C3E51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3E51 second address: 10C3E67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F8F4CECCCE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jng 00007F8F4CECCCE6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3E67 second address: 10C3E6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3E6B second address: 10C3E6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1084154 second address: 108416B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pushad 0x00000008 pushad 0x00000009 je 00007F8F4C502406h 0x0000000f jl 00007F8F4C502406h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C1D14 second address: 10C1D1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C1D1C second address: 10C1D20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C1E6F second address: 10C1EB6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF9h 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F8F4CECCCF9h 0x00000011 pushad 0x00000012 popad 0x00000013 jnc 00007F8F4CECCCE6h 0x00000019 popad 0x0000001a pop ebx 0x0000001b pushad 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C1EB6 second address: 10C1EC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F8F4C502406h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C1EC4 second address: 10C1ECA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C22DD second address: 10C22EB instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C22EB second address: 10C22EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C22EF second address: 10C2305 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 jmp 00007F8F4C50240Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C2305 second address: 10C230A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C230A second address: 10C231C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c jne 00007F8F4C502406h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C2746 second address: 10C274D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C274D second address: 10C2761 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4C502410h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C2761 second address: 10C277D instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8F4CECCCE6h 0x00000008 jmp 00007F8F4CECCCEFh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C28C3 second address: 10C28CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C28CB second address: 10C28D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F8F4CECCCE6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C2A34 second address: 10C2A3A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C2A3A second address: 10C2A75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b jnl 00007F8F4CECCCE6h 0x00000011 jmp 00007F8F4CECCCF6h 0x00000016 popad 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B62D0 second address: 10B62D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B62D4 second address: 10B62E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007F8F4CECCCE6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B62E3 second address: 10B62FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F8F4C502406h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e jg 00007F8F4C502406h 0x00000014 pushad 0x00000015 popad 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B62FA second address: 10B62FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1097F5E second address: 1097F70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F8F4C50240Bh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1097F70 second address: 1097F76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C39C1 second address: 10C39C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C39C8 second address: 10C39D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F8F4CECCCE6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3C63 second address: 10C3C69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3C69 second address: 10C3C74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push edx 0x00000009 pop edx 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3C74 second address: 10C3C96 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8F4C50240Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F8F4C50240Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3C96 second address: 10C3C9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C3C9E second address: 10C3CA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C9354 second address: 10C93A5 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b jmp 00007F8F4CECCCF9h 0x00000010 pop edi 0x00000011 jmp 00007F8F4CECCCEDh 0x00000016 jmp 00007F8F4CECCCF0h 0x0000001b popad 0x0000001c je 00007F8F4CECCCFEh 0x00000022 push eax 0x00000023 push edx 0x00000024 jl 00007F8F4CECCCE6h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10C93A5 second address: 10C93A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CD1EB second address: 10CD1F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CD1F1 second address: 10CD1F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CD1F7 second address: 10CD217 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jc 00007F8F4CECCCECh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CD217 second address: 10CD269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 jp 00007F8F4C502406h 0x0000000b pop ebx 0x0000000c popad 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jmp 00007F8F4C50240Dh 0x00000016 mov eax, dword ptr [eax] 0x00000018 jnp 00007F8F4C502412h 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 push eax 0x00000023 push edx 0x00000024 jns 00007F8F4C50241Ah 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CD39C second address: 10CD3A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CD3A7 second address: 10CD3BA instructions: 0x00000000 rdtsc 0x00000002 jp 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jns 00007F8F4C502406h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D1165 second address: 10D116D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D116D second address: 10D1188 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F8F4C502413h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D1188 second address: 10D11A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4CECCCF2h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D11A6 second address: 10D11B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F8F4C502406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D11B0 second address: 10D11B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D11B4 second address: 10D11C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F8F4C50240Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D11C6 second address: 10D11FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8F4CECCCF4h 0x00000008 jno 00007F8F4CECCCE6h 0x0000000e push edi 0x0000000f pop edi 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007F8F4CECCCF4h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108C53A second address: 108C53E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4098 second address: 10D409E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4C9A second address: 10D4C9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4C9F second address: 10D4CA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F8F4CECCCE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4DBE second address: 10D4DC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F8F4C502406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4DC8 second address: 10D4DCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4DCC second address: 10D4DDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4DDA second address: 10D4DDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4F90 second address: 10D4F95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D4F95 second address: 10D4F9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D505C second address: 10D5066 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D529D second address: 10D52D1 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F8F4CECCCE8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d jmp 00007F8F4CECCCF3h 0x00000012 xchg eax, ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F8F4CECCCEDh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D52D1 second address: 10D52D7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D52D7 second address: 10D52EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8F4CECCCF0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D52EC second address: 10D52F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D52F9 second address: 10D52FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D582A second address: 10D5830 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D5830 second address: 10D583E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4CECCCEAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D583E second address: 10D5842 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D7317 second address: 10D731D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D7967 second address: 10D796D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D8B9A second address: 10D8BA8 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D8326 second address: 10D832A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DA21D second address: 10DA223 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D9F99 second address: 10D9F9F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DB549 second address: 10DB54D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DBFCF second address: 10DBFD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DBFD3 second address: 10DC009 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8F4CECCCF0h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DED85 second address: 10DED8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DED8B second address: 10DEE0F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F8F4CECCCF0h 0x00000012 nop 0x00000013 xor bl, FFFFFFBAh 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push ecx 0x0000001b call 00007F8F4CECCCE8h 0x00000020 pop ecx 0x00000021 mov dword ptr [esp+04h], ecx 0x00000025 add dword ptr [esp+04h], 0000001Ah 0x0000002d inc ecx 0x0000002e push ecx 0x0000002f ret 0x00000030 pop ecx 0x00000031 ret 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push ebx 0x00000037 call 00007F8F4CECCCE8h 0x0000003c pop ebx 0x0000003d mov dword ptr [esp+04h], ebx 0x00000041 add dword ptr [esp+04h], 00000018h 0x00000049 inc ebx 0x0000004a push ebx 0x0000004b ret 0x0000004c pop ebx 0x0000004d ret 0x0000004e mov dword ptr [ebp+12450DF3h], ecx 0x00000054 jng 00007F8F4CECCCEDh 0x0000005a pushad 0x0000005b movzx ebx, di 0x0000005e pushad 0x0000005f popad 0x00000060 popad 0x00000061 push eax 0x00000062 pushad 0x00000063 push eax 0x00000064 push edx 0x00000065 js 00007F8F4CECCCE6h 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DFCE2 second address: 10DFCE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DFCE6 second address: 10DFD79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], eax 0x0000000a movzx ebx, bx 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push edi 0x00000012 call 00007F8F4CECCCE8h 0x00000017 pop edi 0x00000018 mov dword ptr [esp+04h], edi 0x0000001c add dword ptr [esp+04h], 00000016h 0x00000024 inc edi 0x00000025 push edi 0x00000026 ret 0x00000027 pop edi 0x00000028 ret 0x00000029 mov dword ptr [ebp+124678DFh], ebx 0x0000002f mov dword ptr [ebp+12450DF3h], eax 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push esi 0x0000003a call 00007F8F4CECCCE8h 0x0000003f pop esi 0x00000040 mov dword ptr [esp+04h], esi 0x00000044 add dword ptr [esp+04h], 00000018h 0x0000004c inc esi 0x0000004d push esi 0x0000004e ret 0x0000004f pop esi 0x00000050 ret 0x00000051 mov bx, dx 0x00000054 sub dword ptr [ebp+12451F65h], esi 0x0000005a xchg eax, esi 0x0000005b pushad 0x0000005c push eax 0x0000005d jmp 00007F8F4CECCCF4h 0x00000062 pop eax 0x00000063 jns 00007F8F4CECCCECh 0x00000069 js 00007F8F4CECCCE6h 0x0000006f popad 0x00000070 push eax 0x00000071 push ecx 0x00000072 jnl 00007F8F4CECCCECh 0x00000078 push eax 0x00000079 push edx 0x0000007a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10DFEE4 second address: 10DFEE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E2F1F second address: 10E2F41 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8F4CECCCFDh 0x00000008 jnc 00007F8F4CECCCE6h 0x0000000e jmp 00007F8F4CECCCF1h 0x00000013 push ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10964ED second address: 1096509 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4C50240Ah 0x00000009 popad 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jnc 00007F8F4C502406h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1096509 second address: 1096517 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jne 00007F8F4CECCCE6h 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1096517 second address: 109651C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E0F63 second address: 10E0F85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F8F4CECCCEDh 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007F8F4CECCCECh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E4E57 second address: 10E4E7B instructions: 0x00000000 rdtsc 0x00000002 js 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jl 00007F8F4C502408h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8F4C50240Eh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E6A30 second address: 10E6A34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E6A34 second address: 10E6A38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E6A38 second address: 10E6A3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E6A3E second address: 10E6A61 instructions: 0x00000000 rdtsc 0x00000002 js 00007F8F4C502414h 0x00000008 jmp 00007F8F4C50240Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jp 00007F8F4C502406h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E6A61 second address: 10E6A67 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E6A67 second address: 10E6A6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E8B63 second address: 10E8B69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E8B69 second address: 10E8B7E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F8F4C50240Dh 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E8B7E second address: 10E8B84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E8B84 second address: 10E8B88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E8B88 second address: 10E8B8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10E9F72 second address: 10E9FC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 mov dword ptr [esp], eax 0x00000009 add ebx, 2CD62DE1h 0x0000000f mov bl, dl 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push edx 0x00000016 call 00007F8F4C502408h 0x0000001b pop edx 0x0000001c mov dword ptr [esp+04h], edx 0x00000020 add dword ptr [esp+04h], 0000001Bh 0x00000028 inc edx 0x00000029 push edx 0x0000002a ret 0x0000002b pop edx 0x0000002c ret 0x0000002d mov dword ptr [ebp+1245CB43h], ecx 0x00000033 push ebx 0x00000034 pop ebx 0x00000035 push 00000000h 0x00000037 cld 0x00000038 push eax 0x00000039 push ecx 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007F8F4C502411h 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10EEF88 second address: 10EEF8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10EEF8E second address: 10EF013 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007F8F4C502408h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 00000016h 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 add bx, F260h 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c push edx 0x0000002d call 00007F8F4C502408h 0x00000032 pop edx 0x00000033 mov dword ptr [esp+04h], edx 0x00000037 add dword ptr [esp+04h], 00000014h 0x0000003f inc edx 0x00000040 push edx 0x00000041 ret 0x00000042 pop edx 0x00000043 ret 0x00000044 mov di, ax 0x00000047 call 00007F8F4C502414h 0x0000004c mov dword ptr [ebp+122D2986h], ebx 0x00000052 pop edi 0x00000053 push 00000000h 0x00000055 pushad 0x00000056 mov dword ptr [ebp+122D3867h], ebx 0x0000005c mov ah, 9Ah 0x0000005e popad 0x0000005f add dword ptr [ebp+122D2F49h], edx 0x00000065 xchg eax, esi 0x00000066 push eax 0x00000067 push edx 0x00000068 push eax 0x00000069 jnp 00007F8F4C502406h 0x0000006f pop eax 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10EF013 second address: 10EF018 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10EFEC6 second address: 10EFECD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10EFECD second address: 10EFF41 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov edi, ebx 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007F8F4CECCCE8h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 00000019h 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 push edi 0x00000029 mov ebx, eax 0x0000002b pop ebx 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push eax 0x00000031 call 00007F8F4CECCCE8h 0x00000036 pop eax 0x00000037 mov dword ptr [esp+04h], eax 0x0000003b add dword ptr [esp+04h], 0000001Ah 0x00000043 inc eax 0x00000044 push eax 0x00000045 ret 0x00000046 pop eax 0x00000047 ret 0x00000048 xchg eax, esi 0x00000049 pushad 0x0000004a push eax 0x0000004b push ebx 0x0000004c pop ebx 0x0000004d pop eax 0x0000004e push eax 0x0000004f push edx 0x00000050 jmp 00007F8F4CECCCEAh 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10ED193 second address: 10ED198 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10ED198 second address: 10ED20B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F8F4CECCCE6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push edi 0x00000011 call 00007F8F4CECCCE8h 0x00000016 pop edi 0x00000017 mov dword ptr [esp+04h], edi 0x0000001b add dword ptr [esp+04h], 00000018h 0x00000023 inc edi 0x00000024 push edi 0x00000025 ret 0x00000026 pop edi 0x00000027 ret 0x00000028 mov bx, 1CA4h 0x0000002c push dword ptr fs:[00000000h] 0x00000033 mov di, dx 0x00000036 stc 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e call 00007F8F4CECCCEAh 0x00000043 mov dword ptr [ebp+124695F0h], eax 0x00000049 pop ebx 0x0000004a mov eax, dword ptr [ebp+122D14EDh] 0x00000050 xor bx, 16E7h 0x00000055 push FFFFFFFFh 0x00000057 sub dword ptr [ebp+122D363Dh], ebx 0x0000005d mov bx, di 0x00000060 nop 0x00000061 push eax 0x00000062 push edx 0x00000063 pushad 0x00000064 push ebx 0x00000065 pop ebx 0x00000066 push eax 0x00000067 push edx 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10EE107 second address: 10EE10B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10EF220 second address: 10EF23B instructions: 0x00000000 rdtsc 0x00000002 je 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F8F4CECCCEEh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10ED20B second address: 10ED210 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F357F second address: 10F358B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F358B second address: 10F35C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 nop 0x00000007 movzx ebx, cx 0x0000000a push 00000000h 0x0000000c push 00000000h 0x0000000e push eax 0x0000000f call 00007F8F4C502408h 0x00000014 pop eax 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc eax 0x00000022 push eax 0x00000023 ret 0x00000024 pop eax 0x00000025 ret 0x00000026 push 00000000h 0x00000028 mov bx, di 0x0000002b xchg eax, esi 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F35C1 second address: 10F35C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F35C7 second address: 10F35CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F015F second address: 10F018C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8F4CECCCEDh 0x00000008 js 00007F8F4CECCCE6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8F4CECCCF1h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F111C second address: 10F1126 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F1126 second address: 10F113F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jp 00007F8F4CECCCE6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f js 00007F8F4CECCCF8h 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F113F second address: 10F1143 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F1143 second address: 10F11EC instructions: 0x00000000 rdtsc 0x00000002 ja 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push esi 0x0000000e call 00007F8F4CECCCE8h 0x00000013 pop esi 0x00000014 mov dword ptr [esp+04h], esi 0x00000018 add dword ptr [esp+04h], 00000017h 0x00000020 inc esi 0x00000021 push esi 0x00000022 ret 0x00000023 pop esi 0x00000024 ret 0x00000025 jg 00007F8F4CECCCECh 0x0000002b mov dword ptr [ebp+122D373Ah], ebx 0x00000031 push dword ptr fs:[00000000h] 0x00000038 mov edi, 3FC63BB6h 0x0000003d mov dword ptr fs:[00000000h], esp 0x00000044 mov dword ptr [ebp+122D3759h], eax 0x0000004a mov bh, 80h 0x0000004c mov eax, dword ptr [ebp+122D0599h] 0x00000052 push 00000000h 0x00000054 push eax 0x00000055 call 00007F8F4CECCCE8h 0x0000005a pop eax 0x0000005b mov dword ptr [esp+04h], eax 0x0000005f add dword ptr [esp+04h], 0000001Bh 0x00000067 inc eax 0x00000068 push eax 0x00000069 ret 0x0000006a pop eax 0x0000006b ret 0x0000006c mov di, 2D93h 0x00000070 push FFFFFFFFh 0x00000072 mov dword ptr [ebp+12458D41h], eax 0x00000078 push eax 0x00000079 push eax 0x0000007a push edx 0x0000007b pushad 0x0000007c jmp 00007F8F4CECCCF6h 0x00000081 push esi 0x00000082 pop esi 0x00000083 popad 0x00000084 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F5806 second address: 10F5818 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a ja 00007F8F4C502406h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10F387C second address: 10F3882 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10FDEFE second address: 10FDF04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10FDF04 second address: 10FDF08 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10FDF08 second address: 10FDF0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108DF71 second address: 108DFA9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCECh 0x00000007 jl 00007F8F4CECCCF8h 0x0000000d jmp 00007F8F4CECCCF2h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 push eax 0x00000018 pop eax 0x00000019 push edx 0x0000001a pop edx 0x0000001b pop esi 0x0000001c push eax 0x0000001d push edx 0x0000001e jo 00007F8F4CECCCE6h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108DFA9 second address: 108DFC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F8F4C502411h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108DFC0 second address: 108DFD3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8F4CECCCEEh 0x00000008 pushad 0x00000009 popad 0x0000000a jns 00007F8F4CECCCE6h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10FD772 second address: 10FD778 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10FD778 second address: 10FD77E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10FD77E second address: 10FD79A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4C502418h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10FD8C8 second address: 10FD8E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jl 00007F8F4CECCD1Fh 0x0000000b jmp 00007F8F4CECCCEAh 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D94FF second address: 10D950C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a push eax 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1102F3F second address: 1102F45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1105BAE second address: 1105BEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 push eax 0x00000007 jne 00007F8F4C50240Eh 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jno 00007F8F4C50241Ch 0x00000017 mov eax, dword ptr [eax] 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d pop eax 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1105BEA second address: 1105C0E instructions: 0x00000000 rdtsc 0x00000002 jc 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 jmp 00007F8F4CECCCF1h 0x00000017 pop ecx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1109DB7 second address: 1109DDD instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F8F4C502416h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 push eax 0x00000013 pop eax 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1091554 second address: 109155A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109155A second address: 1091568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007F8F4C502406h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1091568 second address: 1091572 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F8F4CECCCE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110FC21 second address: 110FC25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110FC25 second address: 110FC2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110FC2B second address: 110FC31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110FD9A second address: 110FDA9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110FDA9 second address: 110FDD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F8F4C50240Eh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8F4C502411h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110FDD3 second address: 110FDD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11101C6 second address: 11101CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 111031D second address: 1110321 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1110321 second address: 1110347 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502415h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edx 0x0000000b pop edx 0x0000000c pushad 0x0000000d popad 0x0000000e jnl 00007F8F4C502406h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 111072E second address: 1110732 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1110732 second address: 111073E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110F883 second address: 110F8C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4CECCCF2h 0x00000009 jnc 00007F8F4CECCCE6h 0x0000000f popad 0x00000010 jmp 00007F8F4CECCCEBh 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F8F4CECCCF1h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 110F8C0 second address: 110F8C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 111604B second address: 1116051 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2765 second address: 10D27EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502412h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jno 00007F8F4C502414h 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007F8F4C502408h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c or ecx, dword ptr [ebp+122D2CA9h] 0x00000032 lea eax, dword ptr [ebp+124874C6h] 0x00000038 push 00000000h 0x0000003a push eax 0x0000003b call 00007F8F4C502408h 0x00000040 pop eax 0x00000041 mov dword ptr [esp+04h], eax 0x00000045 add dword ptr [esp+04h], 0000001Ch 0x0000004d inc eax 0x0000004e push eax 0x0000004f ret 0x00000050 pop eax 0x00000051 ret 0x00000052 push eax 0x00000053 pushad 0x00000054 push esi 0x00000055 pushad 0x00000056 popad 0x00000057 pop esi 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D27EB second address: 10D27EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D27EF second address: 10D27F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D27F3 second address: 10B62FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007F8F4CECCCE8h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 mov dword ptr [ebp+122D3B25h], esi 0x0000002a call dword ptr [ebp+1245CDECh] 0x00000030 jp 00007F8F4CECCD08h 0x00000036 push eax 0x00000037 push edx 0x00000038 push esi 0x00000039 jg 00007F8F4CECCCE6h 0x0000003f pushad 0x00000040 popad 0x00000041 pop esi 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2DDC second address: 10D2DE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2DE0 second address: 10D2E4B instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b xor dword ptr [esp], 756A5282h 0x00000012 push 00000000h 0x00000014 push eax 0x00000015 call 00007F8F4CECCCE8h 0x0000001a pop eax 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc eax 0x00000028 push eax 0x00000029 ret 0x0000002a pop eax 0x0000002b ret 0x0000002c and ecx, dword ptr [ebp+122D2EEDh] 0x00000032 sub edi, dword ptr [ebp+122D2D3Dh] 0x00000038 mov cx, dx 0x0000003b call 00007F8F4CECCCE9h 0x00000040 jmp 00007F8F4CECCCF6h 0x00000045 push eax 0x00000046 pushad 0x00000047 jl 00007F8F4CECCCECh 0x0000004d push eax 0x0000004e push edx 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2E4B second address: 10D2E53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2E53 second address: 10D2E68 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2E68 second address: 10D2E6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2E6E second address: 10D2E73 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2F63 second address: 10D2F6D instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D3008 second address: 10D3041 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b xchg eax, esi 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007F8F4CECCCE8h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 mov dword ptr [ebp+124695F0h], edx 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 pushad 0x00000031 popad 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D3041 second address: 10D3046 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D3046 second address: 10D304B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D31CC second address: 10D31DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D31DF second address: 10D31F0 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D3895 second address: 10D3899 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D3AD0 second address: 10D3AE9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8F4CECCCECh 0x00000008 jnl 00007F8F4CECCCE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D3B84 second address: 10D3C33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F8F4C50240Fh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push ecx 0x0000000f jmp 00007F8F4C50240Ch 0x00000014 pop ecx 0x00000015 nop 0x00000016 push 00000000h 0x00000018 push ebx 0x00000019 call 00007F8F4C502408h 0x0000001e pop ebx 0x0000001f mov dword ptr [esp+04h], ebx 0x00000023 add dword ptr [esp+04h], 00000019h 0x0000002b inc ebx 0x0000002c push ebx 0x0000002d ret 0x0000002e pop ebx 0x0000002f ret 0x00000030 sub dword ptr [ebp+122D1C89h], edx 0x00000036 mov cx, F2ACh 0x0000003a lea eax, dword ptr [ebp+1248750Ah] 0x00000040 cld 0x00000041 call 00007F8F4C502411h 0x00000046 pop edx 0x00000047 nop 0x00000048 ja 00007F8F4C502413h 0x0000004e push eax 0x0000004f jno 00007F8F4C50240Ah 0x00000055 nop 0x00000056 jmp 00007F8F4C502410h 0x0000005b lea eax, dword ptr [ebp+124874C6h] 0x00000061 movsx ecx, bx 0x00000064 push eax 0x00000065 push eax 0x00000066 push edx 0x00000067 push eax 0x00000068 jo 00007F8F4C502406h 0x0000006e pop eax 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D3C33 second address: 10B6F61 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8F4CECCCE8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f mov ecx, 46D66369h 0x00000014 call dword ptr [ebp+122D3619h] 0x0000001a jl 00007F8F4CECCCF8h 0x00000020 push esi 0x00000021 jbe 00007F8F4CECCCE6h 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11151EA second address: 11151EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11151EE second address: 11151F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11151F2 second address: 1115208 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4C502410h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1115359 second address: 1115364 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F8F4CECCCE6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1115364 second address: 111536A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11154D2 second address: 11154D9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11154D9 second address: 11154FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop eax 0x0000000d jbe 00007F8F4C502418h 0x00000013 jmp 00007F8F4C502412h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1121DA3 second address: 1121DD8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8F4CECCCF1h 0x00000008 jmp 00007F8F4CECCCF6h 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007F8F4CECCCE6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1121DD8 second address: 1121DDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1121DDC second address: 1121DE2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1121F01 second address: 1121F47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jno 00007F8F4C502406h 0x0000000d jmp 00007F8F4C502419h 0x00000012 pop eax 0x00000013 pop edx 0x00000014 push ecx 0x00000015 jmp 00007F8F4C502415h 0x0000001a ja 00007F8F4C502420h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1122353 second address: 112237D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 jmp 00007F8F4CECCCF3h 0x0000000c jp 00007F8F4CECCCE6h 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 112237D second address: 1122381 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1122605 second address: 112260B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 112260B second address: 1122611 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11228FE second address: 112290F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4CECCCEAh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1122C06 second address: 1122C28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 jmp 00007F8F4C502416h 0x0000000e pushad 0x0000000f popad 0x00000010 pop esi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1122C28 second address: 1122C37 instructions: 0x00000000 rdtsc 0x00000002 js 00007F8F4CECCCE8h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1126ECA second address: 1126ECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1126ECE second address: 1126ED2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1126ED2 second address: 1126EE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jo 00007F8F4C502406h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11267EE second address: 11267F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11267F4 second address: 11267FE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11267FE second address: 1126802 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1126BDC second address: 1126C04 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502410h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F8F4C50240Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1126C04 second address: 1126C08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1129155 second address: 112915B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 112915B second address: 112915F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 112915F second address: 1129163 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 112D3A2 second address: 112D3AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1094B02 second address: 1094B06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1094B06 second address: 1094B0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11321E2 second address: 11321E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11324F6 second address: 11324FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11324FA second address: 1132512 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push edx 0x00000008 push edi 0x00000009 jmp 00007F8F4C50240Bh 0x0000000e pop edi 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D354B second address: 10D3551 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D35EF second address: 10D360A instructions: 0x00000000 rdtsc 0x00000002 jg 00007F8F4C502408h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007F8F4C50240Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D360A second address: 10D360F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D35EB second address: 10D35EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1136D23 second address: 1136D29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1136D29 second address: 1136D2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1136D2E second address: 1136D64 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF7h 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pop edx 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8F4CECCCECh 0x00000017 jnl 00007F8F4CECCCE6h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1136D64 second address: 1136D6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1136EE6 second address: 1136EF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jnp 00007F8F4CECCCE6h 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113705B second address: 1137076 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jo 00007F8F4C502406h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1137076 second address: 1137080 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1137080 second address: 1137084 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1137084 second address: 113708A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113732A second address: 1137333 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1137333 second address: 1137337 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113E435 second address: 113E43B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113E9CA second address: 113E9EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4CECCCF8h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113E9EA second address: 113E9EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113E9EF second address: 113EA11 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F8F4CECCD04h 0x00000008 jmp 00007F8F4CECCCF8h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113ECD9 second address: 113ECE1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113F204 second address: 113F211 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F8F4CECCCE6h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113FD74 second address: 113FD90 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jc 00007F8F4C502406h 0x0000000d pushad 0x0000000e popad 0x0000000f jng 00007F8F4C502406h 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 113FD90 second address: 113FD94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144839 second address: 1144843 instructions: 0x00000000 rdtsc 0x00000002 js 00007F8F4C502406h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144843 second address: 1144861 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F8F4CECCCF5h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144861 second address: 1144868 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144868 second address: 114487D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 jmp 00007F8F4CECCCEDh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144996 second address: 11449B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F8F4C502414h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144B1A second address: 1144B20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144B20 second address: 1144B2C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1144CAD second address: 1144CBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jnp 00007F8F4CECCCEAh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1152389 second address: 11523A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F8F4C502411h 0x0000000e push eax 0x0000000f push esi 0x00000010 pop esi 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11523A7 second address: 11523C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF7h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11523C4 second address: 11523C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1150BFF second address: 1150C2F instructions: 0x00000000 rdtsc 0x00000002 jg 00007F8F4CECCCEEh 0x00000008 jnl 00007F8F4CECCCFAh 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1150C2F second address: 1150C35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1150C35 second address: 1150C3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1150F18 second address: 1150F30 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F8F4C502412h 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1150F30 second address: 1150F34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11510A5 second address: 11510A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11510A9 second address: 11510AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11510AF second address: 11510B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11510B5 second address: 11510D9 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F8F4CECCCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1151257 second address: 1151268 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4C50240Ch 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1151A2D second address: 1151A31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11521BE second address: 11521C8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11521C8 second address: 11521CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11521CC second address: 11521ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jnp 00007F8F4C502406h 0x0000000f pop edx 0x00000010 popad 0x00000011 pushad 0x00000012 jp 00007F8F4C50240Ch 0x00000018 push esi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 114FF65 second address: 114FF69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11596FA second address: 1159706 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jnl 00007F8F4C502406h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1164BF5 second address: 1164BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1164BF9 second address: 1164C0D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Eh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1164C0D second address: 1164C13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1164C13 second address: 1164C17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1164C17 second address: 1164C24 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8F4CECCCE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1164C24 second address: 1164C39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jne 00007F8F4C502406h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1164C39 second address: 1164C51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F8F4CECCCF0h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1169235 second address: 1169239 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1169239 second address: 1169241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1168E55 second address: 1168E61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jl 00007F8F4C502406h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 118545A second address: 1185466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F8F4CECCCE6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1185466 second address: 118546B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 118572C second address: 1185745 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8F4CECCCE6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F8F4CECCCEDh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1185745 second address: 1185762 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F8F4C502418h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 118589D second address: 11858A3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11858A3 second address: 11858A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 119E60A second address: 119E632 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F8F4CECCD0Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F8F4CECCCEAh 0x00000015 jmp 00007F8F4CECCCEEh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093008 second address: 1093012 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F8F4C502406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093012 second address: 1093017 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11A00DE second address: 11A010A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4C502417h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8F4C50240Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11AC977 second address: 11AC97B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11AC97B second address: 11AC986 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11AEB1A second address: 11AEB25 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jl 00007F8F4CECCCE6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C8E1A second address: 11C8E1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C8E1F second address: 11C8E29 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F8F4CECCCECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C7DD1 second address: 11C7DEA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 pop edi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8F4C50240Ch 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C806F second address: 11C8075 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C84A8 second address: 11C84C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F8F4C502413h 0x0000000b jbe 00007F8F4C502406h 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C84C8 second address: 11C84D2 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8F4CECCCECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C8628 second address: 11C8630 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C8630 second address: 11C8639 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C8639 second address: 11C863F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C863F second address: 11C8643 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C8924 second address: 11C894D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007F8F4C502406h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007F8F4C502418h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11C894D second address: 11C895B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FA3D second address: 108FA41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FA41 second address: 108FA85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F8F4CECCCF2h 0x0000000c pop ecx 0x0000000d pushad 0x0000000e push ebx 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 pop ebx 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 pushad 0x00000018 popad 0x00000019 pop edx 0x0000001a jmp 00007F8F4CECCCF6h 0x0000001f push eax 0x00000020 push edx 0x00000021 jl 00007F8F4CECCCE6h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CCF56 second address: 11CCF70 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502412h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CCF70 second address: 11CCF74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CD514 second address: 11CD521 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CD521 second address: 11CD57A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jno 00007F8F4CECCCE6h 0x0000000c pop edx 0x0000000d popad 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push ecx 0x00000012 call 00007F8F4CECCCE8h 0x00000017 pop ecx 0x00000018 mov dword ptr [esp+04h], ecx 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc ecx 0x00000025 push ecx 0x00000026 ret 0x00000027 pop ecx 0x00000028 ret 0x00000029 sub dword ptr [ebp+122D1C89h], ebx 0x0000002f push dword ptr [ebp+122D27A0h] 0x00000035 mov dword ptr [ebp+12450DC4h], esi 0x0000003b call 00007F8F4CECCCE9h 0x00000040 jp 00007F8F4CECCCF8h 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007F8F4CECCCEAh 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CD57A second address: 11CD5A7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 je 00007F8F4C50241Eh 0x0000000d ja 00007F8F4C502418h 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push ebx 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CF07E second address: 11CF084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CF084 second address: 11CF08A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 11CEC60 second address: 11CEC64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 527025E second address: 52702D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8F4C502410h 0x00000009 and cx, B3E8h 0x0000000e jmp 00007F8F4C50240Bh 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007F8F4C502418h 0x0000001a adc ah, 00000048h 0x0000001d jmp 00007F8F4C50240Bh 0x00000022 popfd 0x00000023 popad 0x00000024 pop edx 0x00000025 pop eax 0x00000026 mov ebp, esp 0x00000028 pushad 0x00000029 mov dx, ax 0x0000002c mov ebx, esi 0x0000002e popad 0x0000002f pop ebp 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F8F4C502419h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250E8E second address: 5250E94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250E94 second address: 5250E98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250E98 second address: 5250EB0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250EB0 second address: 5250EB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250EB4 second address: 5250EDB instructions: 0x00000000 rdtsc 0x00000002 mov ax, D959h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dx, ax 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F8F4CECCCF7h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250EDB second address: 5250F02 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 53CD2FDFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a mov ecx, edi 0x0000000c popad 0x0000000d popad 0x0000000e xchg eax, ebp 0x0000000f pushad 0x00000010 mov ebx, 2DF0505Ch 0x00000015 mov ax, di 0x00000018 popad 0x00000019 mov ebp, esp 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F8F4C50240Ah 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250F02 second address: 5250F2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f call 00007F8F4CECCCF1h 0x00000014 pop ecx 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A0027 second address: 52A002B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A002B second address: 52A0031 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A0031 second address: 52A009F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F8F4C50240Ch 0x00000008 pop esi 0x00000009 mov bh, C1h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jmp 00007F8F4C50240Dh 0x00000014 xchg eax, ebp 0x00000015 pushad 0x00000016 jmp 00007F8F4C50240Ch 0x0000001b push ecx 0x0000001c pushad 0x0000001d popad 0x0000001e pop edx 0x0000001f popad 0x00000020 mov ebp, esp 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007F8F4C50240Fh 0x0000002b add si, BF1Eh 0x00000030 jmp 00007F8F4C502419h 0x00000035 popfd 0x00000036 movzx ecx, dx 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A009F second address: 52A00A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A00A5 second address: 52A00A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A00A9 second address: 52A00AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A00AD second address: 52A00C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8F4C50240Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52A00C4 second address: 52A00D3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52300E0 second address: 52300E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52300E5 second address: 523013A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F8F4CECCCF6h 0x0000000f push eax 0x00000010 jmp 00007F8F4CECCCEBh 0x00000015 xchg eax, ebp 0x00000016 jmp 00007F8F4CECCCF6h 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 pushad 0x00000021 popad 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 523013A second address: 5230140 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230140 second address: 5230144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230144 second address: 5230148 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230148 second address: 52301BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+04h] 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F8F4CECCCF3h 0x00000012 jmp 00007F8F4CECCCF3h 0x00000017 popfd 0x00000018 pushfd 0x00000019 jmp 00007F8F4CECCCF8h 0x0000001e adc cx, 39C8h 0x00000023 jmp 00007F8F4CECCCEBh 0x00000028 popfd 0x00000029 popad 0x0000002a push dword ptr [ebp+0Ch] 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F8F4CECCCF0h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52301BE second address: 52301C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52301C4 second address: 52301DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52301DF second address: 52301E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52301E5 second address: 52301EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52301EB second address: 52301EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52507CD second address: 52507D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52507D3 second address: 52507F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov cx, di 0x00000012 mov edx, 478D0DF2h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52507F1 second address: 52507F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52507F7 second address: 52507FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52507FB second address: 5250836 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F8F4CECCCEDh 0x00000015 jmp 00007F8F4CECCCF0h 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250836 second address: 5250848 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4C50240Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250848 second address: 525084C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 525084C second address: 525085E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c movzx ecx, di 0x0000000f mov dl, 4Dh 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250690 second address: 5250695 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250695 second address: 52506A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4C50240Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52506A8 second address: 52506CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52506CD second address: 52506EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F8F4C502419h 0x00000009 pop ecx 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52506EC second address: 5250741 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F8F4CECCCF1h 0x00000010 popad 0x00000011 xchg eax, ebp 0x00000012 pushad 0x00000013 jmp 00007F8F4CECCCF6h 0x00000018 popad 0x00000019 mov ebp, esp 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e call 00007F8F4CECCCEDh 0x00000023 pop esi 0x00000024 pushad 0x00000025 popad 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250399 second address: 52503F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8F4C50240Bh 0x00000009 or al, FFFFFFBEh 0x0000000c jmp 00007F8F4C502419h 0x00000011 popfd 0x00000012 push eax 0x00000013 pop edx 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b pushfd 0x0000001c jmp 00007F8F4C502416h 0x00000021 or ax, 18E8h 0x00000026 jmp 00007F8F4C50240Bh 0x0000002b popfd 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52503F6 second address: 5250490 instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 call 00007F8F4CECCCF5h 0x0000000c call 00007F8F4CECCCF0h 0x00000011 pop eax 0x00000012 pop ebx 0x00000013 popad 0x00000014 push eax 0x00000015 pushad 0x00000016 pushad 0x00000017 movsx ebx, si 0x0000001a pushfd 0x0000001b jmp 00007F8F4CECCCF6h 0x00000020 jmp 00007F8F4CECCCF5h 0x00000025 popfd 0x00000026 popad 0x00000027 movzx eax, di 0x0000002a popad 0x0000002b xchg eax, ebp 0x0000002c jmp 00007F8F4CECCCF3h 0x00000031 mov ebp, esp 0x00000033 jmp 00007F8F4CECCCF6h 0x00000038 pop ebp 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250490 second address: 52504AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52504AD second address: 52504B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52504B3 second address: 52504B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 526022A second address: 5260239 instructions: 0x00000000 rdtsc 0x00000002 movsx edi, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5260239 second address: 526023D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 526023D second address: 5260243 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5260243 second address: 5260249 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5260249 second address: 52602C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov edx, eax 0x0000000f pushfd 0x00000010 jmp 00007F8F4CECCCF0h 0x00000015 jmp 00007F8F4CECCCF5h 0x0000001a popfd 0x0000001b popad 0x0000001c mov ebp, esp 0x0000001e jmp 00007F8F4CECCCEEh 0x00000023 pop ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007F8F4CECCCEDh 0x0000002d or ax, 2466h 0x00000032 jmp 00007F8F4CECCCF1h 0x00000037 popfd 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52602C1 second address: 52602C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290E0D second address: 5290E11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290E11 second address: 5290E28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502413h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52705B9 second address: 52705BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52705BF second address: 52705FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F8F4C502412h 0x00000014 xor esi, 15E4DB58h 0x0000001a jmp 00007F8F4C50240Bh 0x0000001f popfd 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52705FA second address: 5270652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F8F4CECCCF6h 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d mov ebx, 412AA564h 0x00000012 movsx ebx, cx 0x00000015 popad 0x00000016 xchg eax, ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007F8F4CECCCF1h 0x00000020 sbb ecx, 59953056h 0x00000026 jmp 00007F8F4CECCCF1h 0x0000002b popfd 0x0000002c pushad 0x0000002d popad 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5270652 second address: 5270660 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4C50240Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5270660 second address: 5270664 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5270664 second address: 527069F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F8F4C502417h 0x0000000f mov eax, dword ptr [ebp+08h] 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8F4C502415h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 527069F second address: 52706A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52706A5 second address: 52706F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502413h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b and dword ptr [eax], 00000000h 0x0000000e jmp 00007F8F4C502416h 0x00000013 and dword ptr [eax+04h], 00000000h 0x00000017 pushad 0x00000018 jmp 00007F8F4C50240Eh 0x0000001d movzx eax, di 0x00000020 popad 0x00000021 pop ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52706F5 second address: 52706F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52706F9 second address: 52706FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52706FD second address: 5270703 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5250580 second address: 52505F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b movzx eax, dx 0x0000000e popad 0x0000000f push eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F8F4C502418h 0x00000017 add ah, 00000068h 0x0000001a jmp 00007F8F4C50240Bh 0x0000001f popfd 0x00000020 pushfd 0x00000021 jmp 00007F8F4C502418h 0x00000026 or ax, A7C8h 0x0000002b jmp 00007F8F4C50240Bh 0x00000030 popfd 0x00000031 popad 0x00000032 xchg eax, ebp 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52505F1 second address: 52505F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52505F5 second address: 52505FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52505FB second address: 5250628 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8F4CECCCF8h 0x00000009 sub ah, 00000058h 0x0000000c jmp 00007F8F4CECCCEBh 0x00000011 popfd 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 527018E second address: 5270194 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5270194 second address: 5270198 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5270198 second address: 52701D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F8F4C502417h 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8F4C502415h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52703CD second address: 52703D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52703D1 second address: 52703D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52703D7 second address: 5270413 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F8F4CECCCF0h 0x0000000f push eax 0x00000010 jmp 00007F8F4CECCCEBh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5270413 second address: 527042E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502417h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 527042E second address: 527047D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, bl 0x00000005 pushfd 0x00000006 jmp 00007F8F4CECCCF0h 0x0000000b adc eax, 1F79F068h 0x00000011 jmp 00007F8F4CECCCEBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov ebp, esp 0x0000001c jmp 00007F8F4CECCCF6h 0x00000021 pop ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 mov ecx, edi 0x00000027 mov edx, 62348D0Ch 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290600 second address: 5290625 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push esi 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290625 second address: 529062A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 529062A second address: 5290660 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502415h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8F4C502418h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290660 second address: 529066F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 529066F second address: 52906B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F8F4C50240Eh 0x00000010 xchg eax, ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F8F4C502417h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52906B6 second address: 5290702 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, C8h 0x00000005 mov ecx, 205CCA87h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 jmp 00007F8F4CECCCF6h 0x00000016 pushfd 0x00000017 jmp 00007F8F4CECCCF2h 0x0000001c and si, 9E98h 0x00000021 jmp 00007F8F4CECCCEBh 0x00000026 popfd 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290702 second address: 5290786 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F8F4C50240Eh 0x0000000f mov eax, dword ptr [76FA65FCh] 0x00000014 jmp 00007F8F4C502410h 0x00000019 test eax, eax 0x0000001b pushad 0x0000001c call 00007F8F4C50240Eh 0x00000021 mov ch, 04h 0x00000023 pop edi 0x00000024 jmp 00007F8F4C50240Ch 0x00000029 popad 0x0000002a je 00007F8FBE195608h 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 mov dl, 7Bh 0x00000035 jmp 00007F8F4C502416h 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290786 second address: 52907F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 pushfd 0x00000007 jmp 00007F8F4CECCCEDh 0x0000000c sbb eax, 55016306h 0x00000012 jmp 00007F8F4CECCCF1h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov ecx, eax 0x0000001d jmp 00007F8F4CECCCEEh 0x00000022 xor eax, dword ptr [ebp+08h] 0x00000025 jmp 00007F8F4CECCCF1h 0x0000002a and ecx, 1Fh 0x0000002d jmp 00007F8F4CECCCEEh 0x00000032 ror eax, cl 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52907F2 second address: 529080F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 529080F second address: 529081F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4CECCCECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 529081F second address: 5290834 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 leave 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F8F4C50240Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290834 second address: 5290846 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4CECCCEEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290846 second address: 529084A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290913 second address: 5290919 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290919 second address: 529091D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 529091D second address: 5290956 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov eax, edx 0x0000000f movsx ebx, cx 0x00000012 popad 0x00000013 xchg eax, ebp 0x00000014 pushad 0x00000015 mov ax, A17Fh 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F8F4CECCCF3h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5290956 second address: 529095A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 529095A second address: 5290960 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240022 second address: 524008A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8F4C502417h 0x00000009 adc al, FFFFFFDEh 0x0000000c jmp 00007F8F4C502419h 0x00000011 popfd 0x00000012 jmp 00007F8F4C502410h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b pushad 0x0000001c mov cl, EAh 0x0000001e movsx edi, si 0x00000021 popad 0x00000022 push eax 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F8F4C502411h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 524008A second address: 52400CA instructions: 0x00000000 rdtsc 0x00000002 mov ah, 56h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov edx, 4661A950h 0x0000000b popad 0x0000000c xchg eax, ebp 0x0000000d pushad 0x0000000e mov eax, edi 0x00000010 pushfd 0x00000011 jmp 00007F8F4CECCCF1h 0x00000016 adc cl, FFFFFFD6h 0x00000019 jmp 00007F8F4CECCCF1h 0x0000001e popfd 0x0000001f popad 0x00000020 mov ebp, esp 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52400CA second address: 52400CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52400CE second address: 52400E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52400E1 second address: 5240144 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, si 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b and esp, FFFFFFF8h 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F8F4C50240Ah 0x00000015 add ax, 2A58h 0x0000001a jmp 00007F8F4C50240Bh 0x0000001f popfd 0x00000020 pushfd 0x00000021 jmp 00007F8F4C502418h 0x00000026 and eax, 3022B4B8h 0x0000002c jmp 00007F8F4C50240Bh 0x00000031 popfd 0x00000032 popad 0x00000033 xchg eax, ecx 0x00000034 pushad 0x00000035 mov dx, cx 0x00000038 push eax 0x00000039 push edx 0x0000003a mov eax, 2E809D3Dh 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240144 second address: 524015E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F8F4CECCCF0h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 524015E second address: 5240162 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240162 second address: 5240168 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240168 second address: 524016E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 524016E second address: 5240172 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 524022E second address: 5240272 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8F4C50240Bh 0x00000009 or eax, 1E381B6Eh 0x0000000f jmp 00007F8F4C502419h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, esi 0x00000019 pushad 0x0000001a mov si, F193h 0x0000001e push eax 0x0000001f pop ecx 0x00000020 popad 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 push edx 0x00000026 pop esi 0x00000027 mov cl, bh 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240272 second address: 52402CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F8F4CECCCF6h 0x0000000f mov esi, dword ptr [ebp+08h] 0x00000012 jmp 00007F8F4CECCCF0h 0x00000017 xchg eax, edi 0x00000018 jmp 00007F8F4CECCCF0h 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F8F4CECCCEDh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52402CE second address: 52402D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52402D2 second address: 52402D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52402D8 second address: 5240302 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F8F4C502417h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240302 second address: 5240388 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007F8F4CECCCEEh 0x00000010 je 00007F8FBEBAAFCCh 0x00000016 pushad 0x00000017 mov cl, 73h 0x00000019 call 00007F8F4CECCCF3h 0x0000001e pop ecx 0x0000001f popad 0x00000020 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000027 pushad 0x00000028 mov ebx, 7EA41A04h 0x0000002d mov edx, 7C4AD270h 0x00000032 popad 0x00000033 je 00007F8FBEBAAFB1h 0x00000039 pushad 0x0000003a jmp 00007F8F4CECCCF5h 0x0000003f mov ah, EBh 0x00000041 popad 0x00000042 mov edx, dword ptr [esi+44h] 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240388 second address: 524038C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 524038C second address: 52403A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52403A0 second address: 52403F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F8F4C502411h 0x00000008 pop esi 0x00000009 call 00007F8F4C502411h 0x0000000e pop esi 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 or edx, dword ptr [ebp+0Ch] 0x00000015 pushad 0x00000016 mov cx, di 0x00000019 popad 0x0000001a test edx, 61000000h 0x00000020 pushad 0x00000021 movsx ebx, cx 0x00000024 movzx eax, dx 0x00000027 popad 0x00000028 jne 00007F8FBE1E06AEh 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F8F4C502410h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52403F8 second address: 5240425 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, CDh 0x00000005 pushfd 0x00000006 jmp 00007F8F4CECCCEAh 0x0000000b sbb ecx, 7EC1E438h 0x00000011 jmp 00007F8F4CECCCEBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a test byte ptr [esi+48h], 00000001h 0x0000001e pushad 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240425 second address: 524045D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F8F4C502410h 0x0000000a add esi, 53C3DE98h 0x00000010 jmp 00007F8F4C50240Bh 0x00000015 popfd 0x00000016 popad 0x00000017 mov dx, cx 0x0000001a popad 0x0000001b jne 00007F8FBE1E0656h 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 524045D second address: 5240461 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240461 second address: 5240467 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240467 second address: 5240480 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4CECCCF5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240480 second address: 52404A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502411h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test bl, 00000007h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov cx, di 0x00000014 movsx edx, cx 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52404A4 second address: 52404AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52404AA second address: 52404AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230793 second address: 5230797 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230797 second address: 523079D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 523079D second address: 52307A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52307A3 second address: 52307E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502418h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F8F4C50240Bh 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F8F4C502410h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52307E2 second address: 52307F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52307F1 second address: 523086D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, cx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007F8F4C50240Ch 0x00000012 and esp, FFFFFFF8h 0x00000015 jmp 00007F8F4C502410h 0x0000001a xchg eax, ebx 0x0000001b jmp 00007F8F4C502410h 0x00000020 push eax 0x00000021 pushad 0x00000022 jmp 00007F8F4C502411h 0x00000027 popad 0x00000028 xchg eax, ebx 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c push esi 0x0000002d pop edi 0x0000002e pushfd 0x0000002f jmp 00007F8F4C502412h 0x00000034 adc si, 27D8h 0x00000039 jmp 00007F8F4C50240Bh 0x0000003e popfd 0x0000003f popad 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 523086D second address: 523094C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F8F4CECCCEEh 0x0000000f push eax 0x00000010 jmp 00007F8F4CECCCEBh 0x00000015 xchg eax, esi 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F8F4CECCCF4h 0x0000001d sub esi, 76402BC8h 0x00000023 jmp 00007F8F4CECCCEBh 0x00000028 popfd 0x00000029 mov ax, 2D3Fh 0x0000002d popad 0x0000002e mov esi, dword ptr [ebp+08h] 0x00000031 jmp 00007F8F4CECCCF2h 0x00000036 sub ebx, ebx 0x00000038 pushad 0x00000039 mov si, di 0x0000003c mov bh, DAh 0x0000003e popad 0x0000003f test esi, esi 0x00000041 jmp 00007F8F4CECCCF2h 0x00000046 je 00007F8FBEBB276Fh 0x0000004c jmp 00007F8F4CECCCF0h 0x00000051 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b pushfd 0x0000005c jmp 00007F8F4CECCCEDh 0x00000061 or esi, 7A7017A6h 0x00000067 jmp 00007F8F4CECCCF1h 0x0000006c popfd 0x0000006d popad 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 523094C second address: 5230952 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230952 second address: 5230956 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230956 second address: 5230994 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ecx, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ecx, 35D56563h 0x00000012 pushfd 0x00000013 jmp 00007F8F4C502418h 0x00000018 sbb ecx, 42A817A8h 0x0000001e jmp 00007F8F4C50240Bh 0x00000023 popfd 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230994 second address: 52309F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007F8FBEBB26EBh 0x00000010 pushad 0x00000011 mov di, 0CF0h 0x00000015 pushfd 0x00000016 jmp 00007F8F4CECCCF9h 0x0000001b and ax, 6A76h 0x00000020 jmp 00007F8F4CECCCF1h 0x00000025 popfd 0x00000026 popad 0x00000027 test byte ptr [76FA6968h], 00000002h 0x0000002e pushad 0x0000002f mov edx, esi 0x00000031 mov dl, ch 0x00000033 popad 0x00000034 jne 00007F8FBEBB26B4h 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d movzx ecx, di 0x00000040 mov bh, 30h 0x00000042 popad 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52309F7 second address: 52309FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52309FD second address: 5230A01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230A01 second address: 5230A55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [ebp+0Ch] 0x0000000b jmp 00007F8F4C502419h 0x00000010 xchg eax, ebx 0x00000011 jmp 00007F8F4C50240Eh 0x00000016 push eax 0x00000017 jmp 00007F8F4C50240Bh 0x0000001c xchg eax, ebx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F8F4C502410h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230A55 second address: 5230A5B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230A5B second address: 5230A90 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F8F4C502410h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8F4C50240Dh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230A90 second address: 5230AA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230AA5 second address: 5230AD2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502411h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F8F4C50240Eh 0x0000000f push dword ptr [ebp+14h] 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230AD2 second address: 5230AD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230AD6 second address: 5230ADC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5230B33 second address: 5230B43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4CECCCECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240D92 second address: 5240D98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240D98 second address: 5240DF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007F8F4CECCCF4h 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 pushad 0x00000013 mov edi, eax 0x00000015 movzx ecx, bx 0x00000018 popad 0x00000019 pushfd 0x0000001a jmp 00007F8F4CECCCF5h 0x0000001f add eax, 2F9A12C6h 0x00000025 jmp 00007F8F4CECCCF1h 0x0000002a popfd 0x0000002b popad 0x0000002c mov ebp, esp 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240DF7 second address: 5240DFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240DFB second address: 5240DFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240DFF second address: 5240E05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240E05 second address: 5240E0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240E0B second address: 5240E0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 5240B49 second address: 5240B58 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52C0763 second address: 52C0772 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8F4C50240Ah 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0A29 second address: 52B0A40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0A40 second address: 52B0A77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F8F4C50240Fh 0x00000008 pop ecx 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jmp 00007F8F4C502412h 0x00000014 mov dword ptr [esp], ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a mov bx, C080h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0A77 second address: 52B0A7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0A7C second address: 52B0A82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0A82 second address: 52B0A86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0A86 second address: 52B0A8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0CF3 second address: 52B0D5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCF2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F8F4CECCCF1h 0x00000011 jmp 00007F8F4CECCCEBh 0x00000016 popfd 0x00000017 mov ax, 041Fh 0x0000001b popad 0x0000001c xchg eax, ebp 0x0000001d jmp 00007F8F4CECCCF2h 0x00000022 mov ebp, esp 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F8F4CECCCF7h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0D5C second address: 52B0D62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0D62 second address: 52B0DBF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4CECCCEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push dword ptr [ebp+0Ch] 0x0000000e jmp 00007F8F4CECCCF6h 0x00000013 push dword ptr [ebp+08h] 0x00000016 pushad 0x00000017 jmp 00007F8F4CECCCEEh 0x0000001c push ecx 0x0000001d mov cl, dl 0x0000001f pop ecx 0x00000020 popad 0x00000021 push 40227F92h 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F8F4CECCCF5h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0DBF second address: 52B0DEA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C502411h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 40237F90h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8F4C50240Dh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0DEA second address: 52B0DFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8F4CECCCECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0E28 second address: 52B0E8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F8F4C502417h 0x00000008 pop eax 0x00000009 mov ecx, edx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e movzx eax, al 0x00000011 pushad 0x00000012 call 00007F8F4C502411h 0x00000017 pushfd 0x00000018 jmp 00007F8F4C502410h 0x0000001d jmp 00007F8F4C502415h 0x00000022 popfd 0x00000023 pop esi 0x00000024 popad 0x00000025 pop ebp 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0E8D second address: 52B0E91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 52B0E91 second address: 52B0EA0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8F4C50240Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1019552001\EUCyhuW.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\370821\Sale.com |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019595001\412ec13ac5.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\GRXZDKKVDB |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\LIJDSFKJZG |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NWCXBPIUYI |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\NYMMPCEIMA |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\VWDFPKGDUF |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\BJZFPPWAPT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EIVQSAOTAQ |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\EWZCVGNOWT |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|
Source: C:\Users\user\AppData\Local\Temp\1019596001\580c9354ec.exe |
Directory queried: C:\Users\user\Documents\PALRGUCVEH |
|