Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: 185.215.113.43 |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: /Zu7JuNko/index.php |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: S-%lu- |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: abc3bc1985 |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: skotes.exe |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Startup |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: cmd /C RMDIR /s/q |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: rundll32 |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Programs |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: %USERPROFILE% |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: cred.dll|clip.dll| |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: cred.dll |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: clip.dll |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: http:// |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: https:// |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: /quiet |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: /Plugins/ |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: &unit= |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: shell32.dll |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: kernel32.dll |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: GetNativeSystemInfo |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: ProgramData\ |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: AVAST Software |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Kaspersky Lab |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Panda Security |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Doctor Web |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: 360TotalSecurity |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Bitdefender |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Norton |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Sophos |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Comodo |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: WinDefender |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: 0123456789 |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Content-Type: multipart/form-data; boundary=---- |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: ------ |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: ?scr=1 |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Content-Type: application/x-www-form-urlencoded |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: ComputerName |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: abcdefghijklmnopqrstuvwxyz0123456789-_ |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: -unicode- |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\ |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SYSTEM\ControlSet001\Services\BasicDisplay\Video |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: VideoID |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: DefaultSettings.XResolution |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: DefaultSettings.YResolution |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: ProductName |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: CurrentBuild |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: rundll32.exe |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: "taskkill /f /im " |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: " && timeout 1 && del |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: && Exit" |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: " && ren |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: Powershell.exe |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: -executionpolicy remotesigned -File " |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: shutdown -s -t 0 |
Source: 0000000E.00000002.2209861495.0000000000C01000.00000040.00000001.01000000.0000000B.sdmp | String decryptor: random |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: hummskitnj.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: cashfuzysao.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: appliacnesot.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: screwamusresz.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: inherineau.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: scentniej.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: rebuildeso.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: prisonyfork.buzz |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: crownybusher.click |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: TeslaBrowser/5.5 |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: - Screen Resoluton: |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: - Physical Installed Memory: |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: Workgroup: - |
Source: 0000002D.00000002.3532425651.00000000004D1000.00000040.00000001.01000000.0000001C.sdmp | String decryptor: H9zQiZ-- |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: INSERT_KEY_HERE |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 07 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 01 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 20 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 25 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetProcAddress |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: LoadLibraryA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: lstrcatA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: OpenEventA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CreateEventA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CloseHandle |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Sleep |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetUserDefaultLangID |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: VirtualAllocExNuma |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: VirtualFree |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetSystemInfo |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: VirtualAlloc |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: HeapAlloc |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetComputerNameA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: lstrcpyA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetProcessHeap |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetCurrentProcess |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: lstrlenA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ExitProcess |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GlobalMemoryStatusEx |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetSystemTime |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SystemTimeToFileTime |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: advapi32.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: gdi32.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: user32.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: crypt32.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetUserNameA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CreateDCA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetDeviceCaps |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ReleaseDC |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CryptStringToBinaryA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sscanf |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: VMwareVMware |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: HAL9TH |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: JohnDoe |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: DISPLAY |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %hu/%hu/%hu |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: http://185.215.113.206 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: /c4becf79229cb002.php |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: /68b591d6548ec281/ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: stok |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetEnvironmentVariableA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetFileAttributesA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: HeapFree |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetFileSize |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GlobalSize |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CreateToolhelp32Snapshot |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: IsWow64Process |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Process32Next |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetLocalTime |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: FreeLibrary |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetTimeZoneInformation |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetSystemPowerStatus |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetVolumeInformationA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetWindowsDirectoryA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Process32First |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetLocaleInfoA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetUserDefaultLocaleName |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetModuleFileNameA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: DeleteFileA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: FindNextFileA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: LocalFree |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: FindClose |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SetEnvironmentVariableA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: LocalAlloc |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetFileSizeEx |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ReadFile |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SetFilePointer |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: WriteFile |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CreateFileA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: FindFirstFileA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CopyFileA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: VirtualProtect |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetLogicalProcessorInformationEx |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetLastError |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: lstrcpynA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: MultiByteToWideChar |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GlobalFree |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: WideCharToMultiByte |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GlobalAlloc |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: OpenProcess |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: TerminateProcess |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetCurrentProcessId |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: gdiplus.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ole32.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: bcrypt.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: wininet.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: shlwapi.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: shell32.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: rstrtmgr.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CreateCompatibleBitmap |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SelectObject |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: BitBlt |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: DeleteObject |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CreateCompatibleDC |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdipGetImageEncodersSize |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdipGetImageEncoders |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdipCreateBitmapFromHBITMAP |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdiplusStartup |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdiplusShutdown |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdipSaveImageToStream |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdipDisposeImage |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GdipFree |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetHGlobalFromStream |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CreateStreamOnHGlobal |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CoUninitialize |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CoInitialize |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CoCreateInstance |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: BCryptGenerateSymmetricKey |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: BCryptCloseAlgorithmProvider |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: BCryptDecrypt |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: BCryptSetProperty |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: BCryptDestroyKey |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: BCryptOpenAlgorithmProvider |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetWindowRect |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetDesktopWindow |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetDC |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CloseWindow |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: wsprintfA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: EnumDisplayDevicesA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetKeyboardLayoutList |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CharToOemW |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: wsprintfW |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RegQueryValueExA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RegEnumKeyExA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RegOpenKeyExA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RegCloseKey |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RegEnumValueA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CryptBinaryToStringA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CryptUnprotectData |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SHGetFolderPathA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ShellExecuteExA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: InternetOpenUrlA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: InternetConnectA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: InternetCloseHandle |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: HttpSendRequestA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: HttpOpenRequestA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: InternetReadFile |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: InternetCrackUrlA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: StrCmpCA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: StrStrA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: StrCmpCW |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: PathMatchSpecA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: GetModuleFileNameExA |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RmStartSession |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RmRegisterResources |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RmGetList |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: RmEndSession |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_open |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_prepare_v2 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_step |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_column_text |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_finalize |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_close |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_column_bytes |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3_column_blob |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: encrypted_key |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: PATH |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: C:\ProgramData\nss3.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: NSS_Init |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: NSS_Shutdown |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: PK11_GetInternalKeySlot |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: PK11_FreeSlot |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: PK11_Authenticate |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: PK11SDR_Decrypt |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: C:\ProgramData\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SELECT origin_url, username_value, password_value FROM logins |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: browser: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: profile: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: url: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: login: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: password: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Opera |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: OperaGX |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Network |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: cookies |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: .txt |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: TRUE |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: FALSE |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: autofill |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: history |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SELECT url FROM urls LIMIT 1000 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: cc |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: name: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: month: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: year: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: card: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Cookies |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Login Data |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Web Data |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: History |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: logins.json |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: formSubmitURL |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: usernameField |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: encryptedUsername |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: encryptedPassword |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: guid |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SELECT fieldname, value FROM moz_formhistory |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SELECT url FROM moz_places LIMIT 1000 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: cookies.sqlite |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: formhistory.sqlite |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: places.sqlite |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: plugins |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Local Extension Settings |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Sync Extension Settings |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: IndexedDB |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Opera Stable |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Opera GX Stable |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: CURRENT |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: chrome-extension_ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: _0.indexeddb.leveldb |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Local State |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: profiles.ini |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: chrome |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: opera |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: firefox |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: wallets |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %08lX%04lX%lu |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ProductName |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: x32 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: x64 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %d/%d/%d %d:%d:%d |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: DisplayName |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: DisplayVersion |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Network Info: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - IP: IP? |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Country: ISO? |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: System Summary: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - HWID: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - OS: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Architecture: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - UserName: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Computer Name: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Local Time: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - UTC: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Language: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Keyboards: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Laptop: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Running Path: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - CPU: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Threads: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Cores: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - RAM: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - Display Resolution: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: - GPU: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: User Agents: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Installed Apps: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: All Users: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Current User: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Process List: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: system_info.txt |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: freebl3.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: mozglue.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: msvcp140.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: nss3.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: softokn3.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: vcruntime140.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \Temp\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: .exe |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: runas |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: open |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: /c start |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %DESKTOP% |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %APPDATA% |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %LOCALAPPDATA% |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %USERPROFILE% |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %DOCUMENTS% |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %PROGRAMFILES_86% |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: %RECENT% |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: *.lnk |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: files |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \discord\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \Local Storage\leveldb\CURRENT |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \Local Storage\leveldb |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \Telegram Desktop\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: key_datas |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: D877F783D5D3EF8C* |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: map* |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: A7FDF864FBC10B77* |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: A92DAA6EA6F891F2* |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: F8806DD0C461824F* |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Telegram |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Tox |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: *.tox |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: *.ini |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Password |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 00000001 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 00000002 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 00000003 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: 00000004 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \Outlook\accounts.txt |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Pidgin |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \.purple\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: accounts.xml |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: dQw4w9WgXcQ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: token: |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Software\Valve\Steam |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: SteamPath |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \config\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ssfn* |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: config.vdf |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: DialogConfig.vdf |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: DialogConfigOverlay*.vdf |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: libraryfolders.vdf |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: loginusers.vdf |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \Steam\ |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: sqlite3.dll |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: done |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: soft |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: \Discord\tokens.txt |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: /c timeout /t 5 & del /f /q " |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: " & del "C:\ProgramData\*.dll"" & exit |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: C:\Windows\system32\cmd.exe |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: https |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Content-Type: multipart/form-data; boundary=---- |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: POST |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: HTTP/1.1 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: Content-Disposition: form-data; name=" |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: hwid |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: build |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: token |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: file_name |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: file |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: message |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 |
Source: 11.2.32ff2fbd90.exe.d60000.0.unpack | String decryptor: screenshot.jpg |
Source: 7d4f3b6a88.exe, 00000019.00000002.2381753960.00000000072BF000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://.css |
Source: 7d4f3b6a88.exe, 00000019.00000002.2381753960.00000000072BF000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://.jpg |
Source: daf7989e83.exe, 00000011.00000003.2349094953.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2375403578.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2538254098.00000000055A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/ |
Source: daf7989e83.exe, 00000011.00000002.2973199382.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/add?substr=mixtwo&s=three&sub=emp |
Source: daf7989e83.exe, 00000011.00000002.2973199382.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/add?substr=mixtwo&s=three&sub=emp4 |
Source: daf7989e83.exe, 00000011.00000002.2973199382.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/dll/download |
Source: daf7989e83.exe, 00000011.00000002.2973199382.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/dll/downloadV |
Source: daf7989e83.exe, 00000011.00000003.2511550898.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2349094953.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2482595026.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000002.2979240394.00000000055A0000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2427990453.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2375403578.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2538254098.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2296574547.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2455194108.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2323232353.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2401506825.00000000055A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/dll/key |
Source: daf7989e83.exe, 00000011.00000003.2375145034.000000000594B000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000002.2973199382.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/files/download |
Source: daf7989e83.exe, 00000011.00000002.2973199382.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/files/download( |
Source: daf7989e83.exe, 00000011.00000003.2511550898.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2349094953.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2482595026.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2427990453.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2375403578.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2538254098.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2455194108.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2401506825.00000000055A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/ll/key |
Source: daf7989e83.exe, 00000011.00000003.2511550898.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2349094953.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2482595026.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2427990453.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2375403578.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2538254098.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2296574547.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2455194108.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2323232353.00000000055A4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2401506825.00000000055A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/qC9k |
Source: daf7989e83.exe, 00000011.00000002.2979475918.0000000005693000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000002.2973199382.0000000000FD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.156.73.23/soft/download |
Source: daf7989e83.exe, 00000011.00000003.2401506825.00000000055B4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2375403578.00000000055B4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2296574547.00000000055B4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2349094953.00000000055B4000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2323232353.00000000055B4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.1QT |
Source: skotes.exe, 0000001C.00000003.4978552669.00000000007CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/luma/random.exe |
Source: skotes.exe, 0000001C.00000003.4978552669.00000000007CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/luma/random.exeH |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/mine/random.exe |
Source: skotes.exe, 0000001C.00000003.4978552669.00000000007CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/steam/random.exe |
Source: skotes.exe, 0000001C.00000003.6135803850.0000000005B2E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/well/ran |
Source: skotes.exe, 0000001C.00000003.4976904444.0000000005B2E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/well/random.exe |
Source: skotes.exe, 0000001C.00000003.4978552669.00000000007CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/well/random.exe9) |
Source: skotes.exe, 0000001C.00000003.4978552669.00000000007CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/well/random.exea5c |
Source: 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000B5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206 |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000738000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 0000000B.00000002.2757686221.000000000189B000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 0000000B.00000002.2757686221.00000000018EC000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000B5B000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/ |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/freebl3.dll |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/freebl3.dll6 |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/mozglue.dll |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/mozglue.dll2 |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000006DE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/msvcp140.dll |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000006DE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/msvcp140.dllb |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/nss3.dll |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000006DE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/softokn3.dll. |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000006DE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/softokn3.dllq |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/sqlite3.dll |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/68b591d6548ec281/vcruntime140.dll |
Source: 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/90 |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000738000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/C |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.000000000189B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/Rw |
Source: 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/a |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.00000000018EC000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000B99000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000007C7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php# |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.00000000018EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php( |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B602000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php.3 |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.00000000018EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php/ |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.00000000018EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php4 |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000007C7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php83m |
Source: 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpJ0 |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000DE4000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpS |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000DE4000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpation |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000738000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000006DE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpd |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000DE4000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B602000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpf3 |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000007C7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpk |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.00000000018EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpl |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.000000000189B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phps |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.00000000007C7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.phpy |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B602000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/c4becf79229cb002.php~3 |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.00000000018EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206/ws |
Source: 32ff2fbd90.exe, 00000018.00000002.2681222976.0000000000B5B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206I |
Source: 32ff2fbd90.exe, 0000000B.00000002.2757686221.000000000189B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.206Y |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000DE4000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.206c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000DE4000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.206ocal |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000DE4000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: http://185.215.113.206ocalMicrosoft |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php2001 |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://31.41.244.11/files/7756467432/64T69R7.exe |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://31.41.244.11/files/7756467432/64T69R7.exeX |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://31.41.244.11/files/kardanvalov88/random.exe |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://31.41.244.11/files/kardanvalov88/random.exeJ |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://31.41.244.11/files/martin/random.exe |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://31.41.244.11/files/moku/random.exe |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.m |
Source: skotes.exe, 0000001C.00000003.3105162110.0000000000796000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 0000001C.00000003.3132261114.000000000079A000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 0000001C.00000003.3133168688.000000000079C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft. |
Source: skotes.exe, 0000001C.00000003.6134973595.0000000005B54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: skotes.exe, 0000001C.00000003.6134973595.0000000005B54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: skotes.exe, 0000001C.00000003.6134973595.0000000005B54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: skotes.exe, 0000001C.00000003.6134973595.0000000005B54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP13 |
Source: Set-up.exe, 0000001B.00000003.2611627373.0000000001AD2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2614034614.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000002.2618514425.0000000001ADB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2612457912.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2613521161.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000002.2615199652.0000000001429000.00000004.00000001.01000000.00000012.sdmp | String found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003 |
Source: Set-up.exe, 0000001B.00000003.2611627373.0000000001AD2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2614034614.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000002.2618514425.0000000001ADB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2612457912.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2613521161.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP17352100034fd4 |
Source: Set-up.exe, 0000001B.00000003.2613521161.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=0 |
Source: Set-up.exe, 0000001B.00000003.2611627373.0000000001AD2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2614034614.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000002.2618514425.0000000001ADB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2612457912.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2613521161.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=0Z |
Source: Set-up.exe, 0000001B.00000002.2615199652.0000000001429000.00000004.00000001.01000000.00000012.sdmp | String found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003http://home.fortth14ht.top/nTrmoVgOaovBJpKS |
Source: Set-up.exe, 0000001B.00000003.2611627373.0000000001AD2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2614034614.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000002.2618514425.0000000001ADB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2612457912.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000003.2613521161.0000000001ADA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003lse |
Source: 7d4f3b6a88.exe, 00000019.00000002.2381753960.00000000072BF000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: skotes.exe, 0000001C.00000003.3105162110.0000000000796000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 0000001C.00000003.3132261114.000000000079A000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 0000001C.00000003.3133168688.000000000079C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://microsoft.coh |
Source: skotes.exe, 0000001C.00000003.6134973595.0000000005B54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: 7d4f3b6a88.exe, 00000019.00000002.2381753960.00000000072BF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://timestamp.digicert.com0 |
Source: daf7989e83.exe, 00000011.00000003.2626241070.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624545330.000000000596E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624346429.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2626928168.0000000005967000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624416185.0000000005660000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2625102028.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2626169832.0000000005A21000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2625475905.0000000005950000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174 |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.microsoft.co |
Source: 32ff2fbd90.exe, 32ff2fbd90.exe, 00000009.00000002.2673231363.000000006C77D000.00000002.00000001.01000000.00000014.sdmp | String found in binary or memory: http://www.mozilla.com/en-US/blocklist/ |
Source: 32ff2fbd90.exe, 00000009.00000002.2672619169.0000000061ED3000.00000004.00001000.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000009.00000002.2661645847.0000000005365000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.sqlite.org/copyright.html. |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700 |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crownybusher.click/ |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crownybusher.click/api |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crownybusher.click/api) |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crownybusher.click/apiF |
Source: cnywnayy_638708640251469628.exe, 0000002D.00000003.3530499028.0000000000E6A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://crownybusher.click/apiX |
Source: Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: 7d4f3b6a88.exe, 00000019.00000002.2381753960.00000000072BF000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: daf7989e83.exe, 00000011.00000003.2626241070.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624545330.000000000596E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624346429.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2626928168.0000000005967000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624416185.0000000005660000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2625102028.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2626169832.0000000005A21000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2625475905.0000000005950000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://g-cleanit.hk |
Source: skotes.exe, 0000001C.00000003.4978796848.00000000007A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/arizaseeen/ariiiza/raw/refs/heads/main/ktiwpptkkmgmawd.exe |
Source: Set-up.exe, 0000001B.00000003.2372989385.0000000001A85000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://httpbin.org/ip |
Source: 7d4f3b6a88.exe, 00000019.00000002.2381753960.00000000072BF000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 0000001B.00000000.2343300110.000000000142B000.00000002.00000001.01000000.00000012.sdmp | String found in binary or memory: https://httpbin.org/ipbefore |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi |
Source: daf7989e83.exe, 00000011.00000003.2626241070.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624545330.000000000596E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624346429.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2626928168.0000000005967000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2624416185.0000000005660000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2625102028.000000000590E000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2626169832.0000000005A21000.00000004.00000020.00020000.00000000.sdmp, daf7989e83.exe, 00000011.00000003.2625475905.0000000005950000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://iplogger.org/1Pz8p7 |
Source: skotes.exe, 0000001C.00000003.4025498350.0000000005B00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13 |
Source: skotes.exe, 0000001C.00000003.6134973595.0000000005B54000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sectigo.com/CPS0 |
Source: 32ff2fbd90.exe, 00000009.00000003.2579563110.000000000B860000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000E2C000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: 32ff2fbd90.exe, 00000009.00000003.2579563110.000000000B860000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.njy8xaI_aUJp |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64 |
Source: 32ff2fbd90.exe, 00000009.00000002.2632544448.0000000000752000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: 32ff2fbd90.exe, 00000009.00000002.2667287859.000000000B5F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000E2C000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/about/ |
Source: 32ff2fbd90.exe, 00000009.00000003.2579563110.000000000B860000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000E2C000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/ |
Source: 32ff2fbd90.exe, 00000009.00000003.2579563110.000000000B860000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000E2C000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/ |
Source: 32ff2fbd90.exe, 00000009.00000003.2579563110.000000000B860000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: 32ff2fbd90.exe, 00000009.00000003.2579563110.000000000B860000.00000004.00000020.00020000.00000000.sdmp, 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000E2C000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: 32ff2fbd90.exe, 00000009.00000002.2638205082.0000000000E2C000.00000040.00000001.01000000.00000009.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/ |
Source: 32ff2fbd90.exe, 00000009.00000003.2579563110.000000000B860000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: mstask.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: dui70.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: chartv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: mozglue.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: pcacli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: mstask.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: dui70.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: chartv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: msimg32.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: msvcr100.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: linkinfo.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: ntshrui.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe | Section loaded: cscapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: rstrtmgr.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\LummaC2.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\LummaC2.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: windowscodecs.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: napinsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: pnrpnsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: wshbth.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: nlaapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: winrnr.dll | |
Source: C:\Users\user\AppData\Local\Temp\Set-up.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Section loaded: apphelp.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\Documents\CBGCAFIIEC.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\Documents\CBGCAFIIEC.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\Documents\CBGCAFIIEC.exe | Section loaded: wininet.dll | |
Source: C:\Users\user\Documents\CBGCAFIIEC.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: textshaping.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: textinputframework.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: coremessaging.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023525001\rsn.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: propsys.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: edputil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: urlmon.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: iertutil.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: srvcli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: netutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: windows.staterepositoryps.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: appresolver.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: bcp47langs.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: slc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: sppc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: onecorecommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: onecoreuapcommonproxystub.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: rasapi32.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: rasman.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: rtutils.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: dhcpcsvc6.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: dhcpcsvc.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: secur32.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: microsoft.management.infrastructure.native.unmanaged.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mi.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: miutils.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wmidcom.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dpapi.dll | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: fastprox.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: ncobjapi.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wbemcomn.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mpclient.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: userenv.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: version.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: msasn1.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: wmitomi.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: mi.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: miutils.dll | |
Source: C:\Windows\System32\wbem\WmiPrvSE.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: apphelp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: winmm.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: windows.storage.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: wldp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: winhttp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: webio.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: mswsock.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: iphlpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: winnsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: sspicli.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: dnsapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: rasadhlp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: schannel.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ntasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ncrypt.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: msasn1.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: cryptsp.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: rsaenh.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: cryptbase.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: gpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: dpapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: uxtheme.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: wbemcomn.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: amsi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: userenv.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: profapi.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: version.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ondemandconnroutehelper.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: mscoree.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: textshaping.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: textinputframework.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: coreuicomponents.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: coremessaging.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: ntmarta.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: coremessaging.dll | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Section loaded: wintypes.dll | |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009135001\d1e123248e.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Users\user\AppData\Local\Temp\1023743001\c2ca7fb2d0.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 7CF4C6 second address: 7CF4CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 7CF4CA second address: 7CF4E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F871CC399FFh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 7CF4E1 second address: 7CF4FA instructions: 0x00000000 rdtsc 0x00000002 jns 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jne 00007F871CD54406h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 947518 second address: 94751C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94751C second address: 947522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 947522 second address: 947528 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 947528 second address: 94752C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9477C7 second address: 9477D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F871CC399F6h 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AAED second address: 94AB0A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jnc 00007F871CD54406h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AB0A second address: 94AB10 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AB10 second address: 94AB66 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54411h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b js 00007F871CD5440Ch 0x00000011 pushad 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 popad 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b jmp 00007F871CD5440Eh 0x00000020 pop eax 0x00000021 lea ebx, dword ptr [ebp+1244F942h] 0x00000027 adc edx, 65CC2727h 0x0000002d push eax 0x0000002e pushad 0x0000002f pushad 0x00000030 pushad 0x00000031 popad 0x00000032 jc 00007F871CD54406h 0x00000038 popad 0x00000039 push eax 0x0000003a push edx 0x0000003b jbe 00007F871CD54406h 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94ABE0 second address: 94AC55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jmp 00007F871CC399FAh 0x0000000b pop edx 0x0000000c popad 0x0000000d push eax 0x0000000e jnp 00007F871CC39A02h 0x00000014 jne 00007F871CC399FCh 0x0000001a nop 0x0000001b push 00000000h 0x0000001d push ebx 0x0000001e call 00007F871CC399F8h 0x00000023 pop ebx 0x00000024 mov dword ptr [esp+04h], ebx 0x00000028 add dword ptr [esp+04h], 00000014h 0x00000030 inc ebx 0x00000031 push ebx 0x00000032 ret 0x00000033 pop ebx 0x00000034 ret 0x00000035 push edi 0x00000036 pushad 0x00000037 mov ebx, dword ptr [ebp+122D3A41h] 0x0000003d mov bl, 47h 0x0000003f popad 0x00000040 pop edi 0x00000041 add dword ptr [ebp+122D2BB7h], esi 0x00000047 mov dword ptr [ebp+122D2AF3h], edi 0x0000004d push 00000000h 0x0000004f mov si, ax 0x00000052 push D7EB8740h 0x00000057 pushad 0x00000058 push ecx 0x00000059 js 00007F871CC399F6h 0x0000005f pop ecx 0x00000060 js 00007F871CC399FCh 0x00000066 push eax 0x00000067 push edx 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AC55 second address: 94ACFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 add dword ptr [esp], 28147940h 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F871CD54408h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 movzx ecx, di 0x00000029 push 00000003h 0x0000002b mov edi, dword ptr [ebp+122D38C5h] 0x00000031 push 00000000h 0x00000033 mov di, 1860h 0x00000037 push 00000003h 0x00000039 push 00000000h 0x0000003b push ebx 0x0000003c call 00007F871CD54408h 0x00000041 pop ebx 0x00000042 mov dword ptr [esp+04h], ebx 0x00000046 add dword ptr [esp+04h], 00000019h 0x0000004e inc ebx 0x0000004f push ebx 0x00000050 ret 0x00000051 pop ebx 0x00000052 ret 0x00000053 sub dword ptr [ebp+122D1C38h], ecx 0x00000059 call 00007F871CD54409h 0x0000005e jl 00007F871CD5441Dh 0x00000064 jmp 00007F871CD54417h 0x00000069 push eax 0x0000006a jnl 00007F871CD5440Eh 0x00000070 mov eax, dword ptr [esp+04h] 0x00000074 push eax 0x00000075 push edx 0x00000076 jc 00007F871CD54408h 0x0000007c pushad 0x0000007d popad 0x0000007e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94ACFE second address: 94AD65 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jp 00007F871CC399F6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f jno 00007F871CC399FCh 0x00000015 jmp 00007F871CC399FEh 0x0000001a popad 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f jmp 00007F871CC39A05h 0x00000024 pop eax 0x00000025 mov esi, 02C19BF8h 0x0000002a mov si, 8FD8h 0x0000002e lea ebx, dword ptr [ebp+1244F94Bh] 0x00000034 pushad 0x00000035 movzx edx, si 0x00000038 popad 0x00000039 xchg eax, ebx 0x0000003a push eax 0x0000003b push edx 0x0000003c jp 00007F871CC399FCh 0x00000042 jo 00007F871CC399F6h 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AD65 second address: 94AD94 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F871CD5441Dh 0x00000008 jmp 00007F871CD54417h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 pushad 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 pop edx 0x00000015 jbe 00007F871CD5440Ch 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AE50 second address: 94AE56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AE56 second address: 94AE5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AF0D second address: 94AF18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F871CC399F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AF18 second address: 94AF3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F871CD54416h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AF3B second address: 94AF62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c pushad 0x0000000d jng 00007F871CC399F6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AF62 second address: 94AF71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 94AF71 second address: 94AFC6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007F871CC399F8h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 00000016h 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 mov cx, AB63h 0x00000026 lea ebx, dword ptr [ebp+1244F956h] 0x0000002c jmp 00007F871CC39A02h 0x00000031 xor cx, 65C7h 0x00000036 xchg eax, ebx 0x00000037 pushad 0x00000038 push esi 0x00000039 jng 00007F871CC399F6h 0x0000003f pop esi 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 popad 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96BEFD second address: 96BF19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD54418h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96BF19 second address: 96BF23 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F871CC399F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 969DAD second address: 969DCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jng 00007F871CD54406h 0x0000000c jng 00007F871CD54406h 0x00000012 popad 0x00000013 js 00007F871CD5440Eh 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96A626 second address: 96A630 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F871CC399FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96AA8D second address: 96AA91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96AA91 second address: 96AAA0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 js 00007F871CC399F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96AAA0 second address: 96AAD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push ecx 0x00000007 pushad 0x00000008 jmp 00007F871CD54415h 0x0000000d jmp 00007F871CD5440Dh 0x00000012 push edi 0x00000013 pop edi 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a pop eax 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9412B9 second address: 9412D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96B09B second address: 96B09F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96B09F second address: 96B0AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F871CC399F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96B90E second address: 96B916 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96B916 second address: 96B91D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96BD5D second address: 96BD63 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96BD63 second address: 96BD68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 96F074 second address: 96F097 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F871CD54425h 0x00000008 jmp 00007F871CD54419h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 93747F second address: 937485 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 937485 second address: 937489 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 970F22 second address: 970F26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 971610 second address: 971633 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F871CD54416h 0x00000008 jmp 00007F871CD54410h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 push edi 0x00000017 pop edi 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 979945 second address: 97994E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97994E second address: 97997D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jnp 00007F871CD54406h 0x00000009 pushad 0x0000000a popad 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F871CD54412h 0x00000013 jmp 00007F871CD5440Fh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97997D second address: 9799A0 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F871CC399F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F871CC39A05h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9799A0 second address: 9799BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CD54419h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9799BD second address: 9799C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 979C3F second address: 979C73 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jc 00007F871CD54406h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d jnp 00007F871CD54406h 0x00000013 jnl 00007F871CD54406h 0x00000019 pop edi 0x0000001a jmp 00007F871CD5440Fh 0x0000001f pushad 0x00000020 jns 00007F871CD54406h 0x00000026 pushad 0x00000027 popad 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 979C73 second address: 979C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97A446 second address: 97A44C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97A44C second address: 97A482 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 00E09529h 0x00000010 mov esi, ebx 0x00000012 mov edi, dword ptr [ebp+122D3C05h] 0x00000018 push 7AF975F7h 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F871CC399FFh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97A7F4 second address: 97A7F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AA88 second address: 97AA90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AF25 second address: 97AF30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F871CD54406h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AF30 second address: 97AF3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AF3E second address: 97AF42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AF42 second address: 97AF4C instructions: 0x00000000 rdtsc 0x00000002 jo 00007F871CC399F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AF4C second address: 97AF52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AF52 second address: 97AF56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AF90 second address: 97AFAA instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F871CD5440Ch 0x00000014 jnp 00007F871CD54406h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97AFAA second address: 97AFB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F871CC399F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97B1F3 second address: 97B1F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97BAA6 second address: 97BAAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97BAAC second address: 97BB4D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F871CD54411h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F871CD54413h 0x00000012 jmp 00007F871CD54412h 0x00000017 popad 0x00000018 nop 0x00000019 push 00000000h 0x0000001b push eax 0x0000001c call 00007F871CD54408h 0x00000021 pop eax 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 add dword ptr [esp+04h], 0000001Ah 0x0000002e inc eax 0x0000002f push eax 0x00000030 ret 0x00000031 pop eax 0x00000032 ret 0x00000033 jmp 00007F871CD5440Dh 0x00000038 push 00000000h 0x0000003a mov di, cx 0x0000003d push 00000000h 0x0000003f push 00000000h 0x00000041 push eax 0x00000042 call 00007F871CD54408h 0x00000047 pop eax 0x00000048 mov dword ptr [esp+04h], eax 0x0000004c add dword ptr [esp+04h], 00000019h 0x00000054 inc eax 0x00000055 push eax 0x00000056 ret 0x00000057 pop eax 0x00000058 ret 0x00000059 mov edi, 5A331395h 0x0000005e push eax 0x0000005f pushad 0x00000060 push ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97C533 second address: 97C537 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97C385 second address: 97C38A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97C537 second address: 97C53B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97C53B second address: 97C558 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F871CD5440Ch 0x0000000c jnp 00007F871CD54406h 0x00000012 popad 0x00000013 push eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 js 00007F871CD54406h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97C558 second address: 97C572 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F871CC399F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F871CC399FEh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97C572 second address: 97C576 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97C576 second address: 97C601 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 jmp 00007F871CC39A05h 0x0000000d mov edi, dword ptr [ebp+122D2D36h] 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ebx 0x00000018 call 00007F871CC399F8h 0x0000001d pop ebx 0x0000001e mov dword ptr [esp+04h], ebx 0x00000022 add dword ptr [esp+04h], 0000001Bh 0x0000002a inc ebx 0x0000002b push ebx 0x0000002c ret 0x0000002d pop ebx 0x0000002e ret 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007F871CC399F8h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 0000001Bh 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b mov esi, dword ptr [ebp+122D39E5h] 0x00000051 xchg eax, ebx 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007F871CC39A05h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D428 second address: 97D42E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97CD3A second address: 97CD41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D42E second address: 97D43D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D43D second address: 97D441 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D441 second address: 97D445 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D445 second address: 97D44B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D44B second address: 97D4A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F871CD54406h 0x00000009 jmp 00007F871CD54419h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 nop 0x00000012 and edi, dword ptr [ebp+122D3AD5h] 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push edx 0x0000001d call 00007F871CD54408h 0x00000022 pop edx 0x00000023 mov dword ptr [esp+04h], edx 0x00000027 add dword ptr [esp+04h], 0000001Bh 0x0000002f inc edx 0x00000030 push edx 0x00000031 ret 0x00000032 pop edx 0x00000033 ret 0x00000034 push 00000000h 0x00000036 cmc 0x00000037 push eax 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D4A5 second address: 97D4AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97D4AB second address: 97D4B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DE45 second address: 97DE6A instructions: 0x00000000 rdtsc 0x00000002 jne 00007F871CC399F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jbe 00007F871CC399F6h 0x00000011 jmp 00007F871CC399FBh 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push esi 0x0000001e pop esi 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DBB9 second address: 97DBCB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F871CD5440Ah 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DE6A second address: 97DE87 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DBCB second address: 97DBCF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DE87 second address: 97DEF6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov di, 83EFh 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007F871CC399F8h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 0000001Ch 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a call 00007F871CC399FFh 0x0000002f cmc 0x00000030 pop esi 0x00000031 push 00000000h 0x00000033 push ecx 0x00000034 push edx 0x00000035 mov di, A788h 0x00000039 pop edi 0x0000003a pop esi 0x0000003b xchg eax, ebx 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007F871CC39A03h 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DBCF second address: 97DBEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 js 00007F871CD5440Ch 0x0000000f jo 00007F871CD54406h 0x00000015 push eax 0x00000016 push edx 0x00000017 jns 00007F871CD54406h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DEF6 second address: 97DF12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC39A08h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DF12 second address: 97DF16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97DF16 second address: 97DF23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97E9C0 second address: 97E9D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 js 00007F871CD5440Ch 0x0000000e jne 00007F871CD54406h 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97E9D9 second address: 97EA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push edi 0x0000000a call 00007F871CC399F8h 0x0000000f pop edi 0x00000010 mov dword ptr [esp+04h], edi 0x00000014 add dword ptr [esp+04h], 0000001Bh 0x0000001c inc edi 0x0000001d push edi 0x0000001e ret 0x0000001f pop edi 0x00000020 ret 0x00000021 mov dword ptr [ebp+122D1C04h], eax 0x00000027 push 00000000h 0x00000029 xor esi, dword ptr [ebp+122D3BC9h] 0x0000002f push 00000000h 0x00000031 call 00007F871CC399FAh 0x00000036 mov di, 24C3h 0x0000003a pop edi 0x0000003b xchg eax, ebx 0x0000003c pushad 0x0000003d ja 00007F871CC39A0Ch 0x00000043 pushad 0x00000044 pushad 0x00000045 popad 0x00000046 jmp 00007F871CC399FBh 0x0000004b popad 0x0000004c popad 0x0000004d push eax 0x0000004e jo 00007F871CC39A11h 0x00000054 push eax 0x00000055 push edx 0x00000056 ja 00007F871CC399F6h 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97F4AB second address: 97F528 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007F871CD54408h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 0000001Bh 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 pushad 0x00000024 and ch, FFFFFF86h 0x00000027 popad 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push ebx 0x0000002f call 00007F871CD54408h 0x00000034 pop ebx 0x00000035 mov dword ptr [esp+04h], ebx 0x00000039 add dword ptr [esp+04h], 00000019h 0x00000041 inc ebx 0x00000042 push ebx 0x00000043 ret 0x00000044 pop ebx 0x00000045 ret 0x00000046 or esi, dword ptr [ebp+122D1B28h] 0x0000004c movzx edi, bx 0x0000004f xchg eax, ebx 0x00000050 push eax 0x00000051 push edx 0x00000052 jns 00007F871CD5441Bh 0x00000058 jmp 00007F871CD54415h 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97F528 second address: 97F545 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jo 00007F871CC39A02h 0x00000010 jg 00007F871CC399FCh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97FEB2 second address: 97FECE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54418h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97FECE second address: 97FEE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC39A02h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97FEE4 second address: 97FEE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97FEE8 second address: 97FF23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov edi, dword ptr [ebp+122D3B8Dh] 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007F871CC399F8h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b add di, E12Ah 0x00000030 push 00000000h 0x00000032 xchg eax, ebx 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97FF23 second address: 97FF27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97FF27 second address: 97FF48 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F871CC399FCh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 97FF48 second address: 97FF52 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 983AFC second address: 983B63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 popad 0x0000000a popad 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F871CC399F8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000015h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 push 00000000h 0x00000028 mov ebx, dword ptr [ebp+12455243h] 0x0000002e pushad 0x0000002f clc 0x00000030 jmp 00007F871CC39A06h 0x00000035 popad 0x00000036 push 00000000h 0x00000038 call 00007F871CC399FAh 0x0000003d sbb ebx, 76BFB226h 0x00000043 pop ebx 0x00000044 mov ebx, 294DD026h 0x00000049 push eax 0x0000004a pushad 0x0000004b push ebx 0x0000004c push eax 0x0000004d push edx 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 984C31 second address: 984C35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 984C35 second address: 984C43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007F871CC399F6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 984C43 second address: 984C63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007F871CD54412h 0x00000010 push esi 0x00000011 pop esi 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 984C63 second address: 984C68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 983DAE second address: 983DBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007F871CD54408h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 985C68 second address: 985CAF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b jbe 00007F871CC39A02h 0x00000011 jmp 00007F871CC399FCh 0x00000016 nop 0x00000017 push 00000000h 0x00000019 xor edi, 175B9C01h 0x0000001f push 00000000h 0x00000021 and di, 9F07h 0x00000026 push edi 0x00000027 mov dword ptr [ebp+122D2DBAh], edx 0x0000002d pop ebx 0x0000002e xchg eax, esi 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 push ebx 0x00000033 pop ebx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 983DBF second address: 983DC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 985CAF second address: 985CB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 983DC5 second address: 983DC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 984DDC second address: 984DE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 984DE3 second address: 984DFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F871CD5440Ch 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 986C48 second address: 986C4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 984DFC second address: 984E06 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 986C4C second address: 986C52 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 986C52 second address: 986C58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 985E71 second address: 985E75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 987CF1 second address: 987D13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 pop edi 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F871CD54412h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 987D13 second address: 987D19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 987D19 second address: 987D97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54411h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007F871CD54408h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 00000018h 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 push 00000000h 0x00000026 push 00000000h 0x00000028 push edx 0x00000029 call 00007F871CD54408h 0x0000002e pop edx 0x0000002f mov dword ptr [esp+04h], edx 0x00000033 add dword ptr [esp+04h], 0000001Bh 0x0000003b inc edx 0x0000003c push edx 0x0000003d ret 0x0000003e pop edx 0x0000003f ret 0x00000040 mov edi, 17CC988Fh 0x00000045 push 00000000h 0x00000047 xor dword ptr [ebp+122D1C38h], esi 0x0000004d mov bx, cx 0x00000050 xchg eax, esi 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007F871CD54410h 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 987D97 second address: 987DBA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 987DBA second address: 987DBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 986DEE second address: 986E64 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F871CC39A06h 0x00000008 push edi 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 mov di, 89BAh 0x00000014 jmp 00007F871CC399FAh 0x00000019 push dword ptr fs:[00000000h] 0x00000020 push 00000000h 0x00000022 push ecx 0x00000023 call 00007F871CC399F8h 0x00000028 pop ecx 0x00000029 mov dword ptr [esp+04h], ecx 0x0000002d add dword ptr [esp+04h], 00000017h 0x00000035 inc ecx 0x00000036 push ecx 0x00000037 ret 0x00000038 pop ecx 0x00000039 ret 0x0000003a mov edi, 082323A7h 0x0000003f mov dword ptr fs:[00000000h], esp 0x00000046 mov ebx, ecx 0x00000048 mov eax, dword ptr [ebp+122D034Dh] 0x0000004e push FFFFFFFFh 0x00000050 mov dword ptr [ebp+122D2DA7h], ebx 0x00000056 nop 0x00000057 pushad 0x00000058 pushad 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 986E64 second address: 986E7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD5440Fh 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 988E44 second address: 988E60 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edi 0x0000000c pushad 0x0000000d popad 0x0000000e pop edi 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 988E60 second address: 988EC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ecx 0x0000000a call 00007F871CD54408h 0x0000000f pop ecx 0x00000010 mov dword ptr [esp+04h], ecx 0x00000014 add dword ptr [esp+04h], 00000015h 0x0000001c inc ecx 0x0000001d push ecx 0x0000001e ret 0x0000001f pop ecx 0x00000020 ret 0x00000021 push 00000000h 0x00000023 push 00000000h 0x00000025 push edi 0x00000026 call 00007F871CD54408h 0x0000002b pop edi 0x0000002c mov dword ptr [esp+04h], edi 0x00000030 add dword ptr [esp+04h], 00000014h 0x00000038 inc edi 0x00000039 push edi 0x0000003a ret 0x0000003b pop edi 0x0000003c ret 0x0000003d mov di, si 0x00000040 push 00000000h 0x00000042 xchg eax, esi 0x00000043 push ecx 0x00000044 push ecx 0x00000045 pushad 0x00000046 popad 0x00000047 pop ecx 0x00000048 pop ecx 0x00000049 push eax 0x0000004a push edi 0x0000004b push eax 0x0000004c push edx 0x0000004d jmp 00007F871CD54415h 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 989FE9 second address: 989FEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98B062 second address: 98B0E6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F871CD54413h 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push eax 0x00000014 call 00007F871CD54408h 0x00000019 pop eax 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e add dword ptr [esp+04h], 00000017h 0x00000026 inc eax 0x00000027 push eax 0x00000028 ret 0x00000029 pop eax 0x0000002a ret 0x0000002b and edi, dword ptr [ebp+122D2D46h] 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push edi 0x00000036 call 00007F871CD54408h 0x0000003b pop edi 0x0000003c mov dword ptr [esp+04h], edi 0x00000040 add dword ptr [esp+04h], 00000016h 0x00000048 inc edi 0x00000049 push edi 0x0000004a ret 0x0000004b pop edi 0x0000004c ret 0x0000004d mov dword ptr [ebp+1244C908h], edx 0x00000053 xchg eax, esi 0x00000054 pushad 0x00000055 jmp 00007F871CD54410h 0x0000005a push eax 0x0000005b push edx 0x0000005c ja 00007F871CD54406h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98E11D second address: 98E175 instructions: 0x00000000 rdtsc 0x00000002 je 00007F871CC399FEh 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a js 00007F871CC399F6h 0x00000010 push eax 0x00000011 jmp 00007F871CC39A09h 0x00000016 pop eax 0x00000017 pop edx 0x00000018 pop eax 0x00000019 pushad 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d pushad 0x0000001e popad 0x0000001f jmp 00007F871CC399FAh 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F871CC39A08h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98B305 second address: 98B332 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jbe 00007F871CD54408h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F871CD54419h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98B332 second address: 98B336 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98F972 second address: 98F999 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F871CD5441Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98F999 second address: 98F99D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98F99D second address: 98F9A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98F9A3 second address: 98F9A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99091B second address: 990925 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F871CD54406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98F9A9 second address: 98F9AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 991872 second address: 9918E6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 jmp 00007F871CD54419h 0x0000000c push dword ptr fs:[00000000h] 0x00000013 mov bx, di 0x00000016 mov dword ptr fs:[00000000h], esp 0x0000001d jne 00007F871CD54412h 0x00000023 mov eax, dword ptr [ebp+122D010Dh] 0x00000029 mov bx, 754Ch 0x0000002d push FFFFFFFFh 0x0000002f jno 00007F871CD54409h 0x00000035 nop 0x00000036 jmp 00007F871CD54414h 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e push esi 0x0000003f push eax 0x00000040 pop eax 0x00000041 pop esi 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 993833 second address: 993837 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 993837 second address: 993841 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 993841 second address: 993845 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 993845 second address: 9938D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54416h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jl 00007F871CD54410h 0x00000011 nop 0x00000012 mov edi, dword ptr [ebp+122D2BFBh] 0x00000018 mov bl, dl 0x0000001a push dword ptr fs:[00000000h] 0x00000021 movsx edi, di 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b mov dword ptr [ebp+1247AD9Ch], ecx 0x00000031 mov eax, dword ptr [ebp+122D020Dh] 0x00000037 js 00007F871CD5440Ch 0x0000003d mov edi, dword ptr [ebp+122D2D54h] 0x00000043 push FFFFFFFFh 0x00000045 mov edi, dword ptr [ebp+122D3AA9h] 0x0000004b call 00007F871CD54413h 0x00000050 mov ebx, dword ptr [ebp+122D3C3Dh] 0x00000056 pop edi 0x00000057 nop 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b push edi 0x0000005c pop edi 0x0000005d jns 00007F871CD54406h 0x00000063 popad 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9938D8 second address: 9938E7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9938E7 second address: 9938EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 994776 second address: 99477C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 994822 second address: 994826 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 994826 second address: 99482C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99A575 second address: 99A580 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99A580 second address: 99A589 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99EFCE second address: 99EFD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 942DE2 second address: 942DE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 942DE6 second address: 942E04 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F871CD54418h 0x0000000c jmp 00007F871CD5440Ch 0x00000011 jc 00007F871CD54406h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99E878 second address: 99E87E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99E9DE second address: 99E9FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F871CD54415h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99E9FD second address: 99EA01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99EB8F second address: 99EB94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99EB94 second address: 99EB9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 99EB9F second address: 99EBA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A43E9 second address: 9A43EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A7FB6 second address: 9A8003 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jno 00007F871CD54406h 0x0000000b push esi 0x0000000c pop esi 0x0000000d popad 0x0000000e pushad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jmp 00007F871CD5440Bh 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push ebx 0x0000001c jmp 00007F871CD54414h 0x00000021 push eax 0x00000022 push edx 0x00000023 push esi 0x00000024 pop esi 0x00000025 jmp 00007F871CD54413h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A857B second address: 9A857F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A857F second address: 9A85B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Fh 0x00000007 jmp 00007F871CD54418h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 ja 00007F871CD54406h 0x00000019 popad 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A85B9 second address: 9A85C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A85C1 second address: 9A85C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A873A second address: 9A8744 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F871CC399FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A889B second address: 9A88AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD5440Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A88AE second address: 9A88B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A88B2 second address: 9A88B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A8E69 second address: 9A8E6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A8E6D second address: 9A8E71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A8E71 second address: 9A8E7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9A8E7C second address: 9A8E88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F871CD54406h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEFA8 second address: 9AEFC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F871CC399FEh 0x0000000c jno 00007F871CC399F6h 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEFC0 second address: 9AEFC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEFC6 second address: 9AEFD8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007F871CC399F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEFD8 second address: 9AEFFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F871CD5440Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f jmp 00007F871CD5440Eh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AD923 second address: 9AD929 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADA8E second address: 9ADA94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADA94 second address: 9ADAC2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F871CC399F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F871CC399FBh 0x00000015 push esi 0x00000016 jmp 00007F871CC39A01h 0x0000001b pop esi 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF04 second address: 9ADF0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF0A second address: 9ADF24 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jg 00007F871CC399F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F871CC399FBh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF24 second address: 9ADF2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF2F second address: 9ADF4E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF4E second address: 9ADF52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF52 second address: 9ADF80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F871CC39A06h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF80 second address: 9ADF86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ADF86 second address: 9ADF8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE283 second address: 9AE2A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54410h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007F871CD54406h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE2A1 second address: 9AE2B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jng 00007F871CC399F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007F871CC399FEh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE2B5 second address: 9AE2CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 jno 00007F871CD54408h 0x0000000e push eax 0x0000000f push edx 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE2CB second address: 9AE2CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE2CF second address: 9AE302 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54414h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F871CD54415h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE302 second address: 9AE306 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE43B second address: 9AE459 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 jmp 00007F871CD5440Dh 0x0000000b pop eax 0x0000000c jo 00007F871CD5440Eh 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE591 second address: 9AE597 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE597 second address: 9AE5BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007F871CD54406h 0x0000000e jmp 00007F871CD54418h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE70E second address: 9AE714 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE714 second address: 9AE718 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE718 second address: 9AE71E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AE71E second address: 9AE739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F871CD5440Ch 0x0000000c pushad 0x0000000d jbe 00007F871CD54406h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 961C02 second address: 961C11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CC399FBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEE3A second address: 9AEE3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEE3E second address: 9AEE44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEE44 second address: 9AEE49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEE49 second address: 9AEE4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEE4F second address: 9AEE55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9AEE55 second address: 9AEE64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007F871CC399F6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9B2764 second address: 9B2768 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9B2768 second address: 9B2772 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F871CC399F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BBC7F second address: 9BBCD6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F871CD54411h 0x0000000c jmp 00007F871CD54411h 0x00000011 jmp 00007F871CD54419h 0x00000016 popad 0x00000017 popad 0x00000018 push ecx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F871CD54410h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BBCD6 second address: 9BBCDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BA8B2 second address: 9BA8D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 jnc 00007F871CD54412h 0x0000000d jng 00007F871CD54406h 0x00000013 jng 00007F871CD54406h 0x00000019 push eax 0x0000001a jnl 00007F871CD54406h 0x00000020 pop eax 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BA8D7 second address: 9BA8E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F871CC399F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BAFCA second address: 9BB013 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F871CD54416h 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jmp 00007F871CD5440Eh 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F871CD54416h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BB013 second address: 9BB01F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BA5B4 second address: 9BA5C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jne 00007F871CD54406h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BA5C6 second address: 9BA5E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F871CC39A04h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BA5E6 second address: 9BA5EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BB2C6 second address: 9BB2CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BB2CC second address: 9BB2E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F871CD5440Dh 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BB2E1 second address: 9BB2EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BB2EF second address: 9BB30D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F871CD54419h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BF396 second address: 9BF39C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BF39C second address: 9BF3C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F871CD54411h 0x0000000c jmp 00007F871CD5440Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 981A86 second address: 981A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9820A4 second address: 9820A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9820A8 second address: 9820AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 982242 second address: 982246 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 982246 second address: 98224C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98224C second address: 982251 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 982362 second address: 98236B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 98236B second address: 982390 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f pushad 0x00000010 jng 00007F871CD54412h 0x00000016 jmp 00007F871CD5440Ch 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9824B0 second address: 9824F3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F871CC399F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F871CC39A09h 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007F871CC39A09h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9824F3 second address: 9824F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9824F8 second address: 982502 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F871CC399F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 982D78 second address: 982D91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jc 00007F871CD5440Eh 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 982D91 second address: 961C02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 nop 0x00000006 je 00007F871CC39A02h 0x0000000c jnl 00007F871CC399FCh 0x00000012 lea eax, dword ptr [ebp+12486849h] 0x00000018 push 00000000h 0x0000001a push edx 0x0000001b call 00007F871CC399F8h 0x00000020 pop edx 0x00000021 mov dword ptr [esp+04h], edx 0x00000025 add dword ptr [esp+04h], 0000001Dh 0x0000002d inc edx 0x0000002e push edx 0x0000002f ret 0x00000030 pop edx 0x00000031 ret 0x00000032 or dword ptr [ebp+122D26DCh], edi 0x00000038 and cx, 7C5Eh 0x0000003d push eax 0x0000003e jmp 00007F871CC39A02h 0x00000043 mov dword ptr [esp], eax 0x00000046 mov cx, bx 0x00000049 lea eax, dword ptr [ebp+12486805h] 0x0000004f jnl 00007F871CC399FAh 0x00000055 mov dh, 85h 0x00000057 push eax 0x00000058 jmp 00007F871CC39A08h 0x0000005d mov dword ptr [esp], eax 0x00000060 mov ecx, dword ptr [ebp+122D3B1Dh] 0x00000066 call dword ptr [ebp+122D1BD7h] 0x0000006c push edi 0x0000006d push eax 0x0000006e push edx 0x0000006f push eax 0x00000070 push edx 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BF758 second address: 9BF75C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BF75C second address: 9BF77D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jmp 00007F871CC399FCh 0x0000000e jp 00007F871CC399F6h 0x00000014 pop edi 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BF77D second address: 9BF783 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BFC80 second address: 9BFC86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9BFF20 second address: 9BFF26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C34C8 second address: 9C34D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007F871CC399F6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C34D9 second address: 9C34DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C34DD second address: 9C34FE instructions: 0x00000000 rdtsc 0x00000002 jng 00007F871CC399F6h 0x00000008 jmp 00007F871CC399FAh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jl 00007F871CC39A06h 0x00000015 push eax 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 pop eax 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C308F second address: 9C309B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 je 00007F871CD54406h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C309B second address: 9C30B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FCh 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C30B3 second address: 9C30CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007F871CD5440Bh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 pop eax 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C30CB second address: 9C30D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 933FCB second address: 933FE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 933FE1 second address: 934007 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnl 00007F871CC399F6h 0x0000000c popad 0x0000000d pop ebx 0x0000000e pushad 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 js 00007F871CC399F6h 0x00000018 pop edx 0x00000019 jmp 00007F871CC399FAh 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C9C0C second address: 9C9C10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C9DA1 second address: 9C9DBB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F871CC39A0Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9C9DBB second address: 9C9DC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F871CD54406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9CE39B second address: 9CE3A7 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F871CC399F6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9CD7A7 second address: 9CD7AC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D287E second address: 9D2888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F871CC399F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2888 second address: 9D2898 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F871CD5440Eh 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2BAC second address: 9D2BB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2BB2 second address: 9D2BB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2BB6 second address: 9D2BBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2D2F second address: 9D2D35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2D35 second address: 9D2D3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2D3B second address: 9D2D55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 pop eax 0x00000008 jmp 00007F871CD5440Eh 0x0000000d pop ebx 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2EB9 second address: 9D2EBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D2EBD second address: 9D2ED3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007F871CD54406h 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 982822 second address: 982826 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 982826 second address: 982885 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push ecx 0x00000009 jmp 00007F871CD54413h 0x0000000e pop ecx 0x0000000f nop 0x00000010 jbe 00007F871CD5440Ch 0x00000016 sub dword ptr [ebp+1244FA48h], esi 0x0000001c mov ebx, dword ptr [ebp+12486844h] 0x00000022 jo 00007F871CD5440Ch 0x00000028 mov edx, dword ptr [ebp+122D1A54h] 0x0000002e jp 00007F871CD5440Ch 0x00000034 sub dword ptr [ebp+1244C908h], edx 0x0000003a add eax, ebx 0x0000003c jmp 00007F871CD5440Ah 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 js 00007F871CD54408h 0x0000004a pushad 0x0000004b popad 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D3179 second address: 9D317F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D317F second address: 9D3189 instructions: 0x00000000 rdtsc 0x00000002 je 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D3189 second address: 9D31C1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F871CC399FFh 0x0000000e jne 00007F871CC399FCh 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F871CC39A02h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D3CF1 second address: 9D3CF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9D3CF7 second address: 9D3CFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DD4A9 second address: 9DD4AF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DB8FC second address: 9DB902 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DC1E3 second address: 9DC208 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007F871CD54410h 0x0000000c jmp 00007F871CD5440Bh 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DCA94 second address: 9DCAB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CC39A01h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jnl 00007F871CC399F6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DCAB6 second address: 9DCABC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DCABC second address: 9DCAC1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DCDE5 second address: 9DCE18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD5440Eh 0x00000009 push eax 0x0000000a pop eax 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e pushad 0x0000000f jmp 00007F871CD54416h 0x00000014 pushad 0x00000015 popad 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DD135 second address: 9DD13F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DD13F second address: 9DD14E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F871CD54406h 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9DD14E second address: 9DD172 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F871CC39A08h 0x00000008 push eax 0x00000009 push edx 0x0000000a jo 00007F871CC399F6h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E05A9 second address: 9E05B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F871CD54406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E05B3 second address: 9E05B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E05B7 second address: 9E05ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD5440Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F871CD54417h 0x00000014 jnc 00007F871CD54412h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E05ED second address: 9E05F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F871CC399F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E0A4F second address: 9E0A71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD54418h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E103A second address: 9E103E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E103E second address: 9E106A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jng 00007F871CD5440Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F871CD5440Eh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E106A second address: 9E106E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E11CC second address: 9E11D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E11D4 second address: 9E11D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E11D9 second address: 9E11DE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9E5FD6 second address: 9E5FDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EF7FE second address: 9EF804 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EDA82 second address: 9EDA8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F871CC399F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EDC49 second address: 9EDC6E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 jc 00007F871CD54406h 0x0000000f pop esi 0x00000010 popad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F871CD5440Fh 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EDC6E second address: 9EDC74 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EDF31 second address: 9EDF3E instructions: 0x00000000 rdtsc 0x00000002 jg 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE068 second address: 9EE06E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE06E second address: 9EE074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE4D4 second address: 9EE4FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jc 00007F871CC399FCh 0x0000000c jno 00007F871CC399F6h 0x00000012 push eax 0x00000013 push edx 0x00000014 jnc 00007F871CC399F6h 0x0000001a jmp 00007F871CC39A01h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE7C4 second address: 9EE7C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE7C8 second address: 9EE7CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE7CC second address: 9EE7DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jnp 00007F871CD54406h 0x0000000f push edi 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE7DF second address: 9EE7E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE93D second address: 9EE943 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9EE943 second address: 9EE967 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c jmp 00007F871CC39A04h 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9ED63B second address: 9ED640 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 93C33D second address: 93C343 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 93C343 second address: 93C356 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F871CD5440Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 93C356 second address: 93C380 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jl 00007F871CC39A09h 0x0000000e jmp 00007F871CC39A01h 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 jl 00007F871CC399F6h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 9F65A0 second address: 9F65B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F871CD5440Bh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0070D second address: A00718 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F871CC399F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A00718 second address: A00738 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 jnc 00007F871CD54408h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jnp 00007F871CD54406h 0x00000018 jbe 00007F871CD54406h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 92B9C7 second address: 92B9CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 92B9CD second address: 92B9D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 92B9D1 second address: 92B9E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FFh 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A06E48 second address: A06E6D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jo 00007F871CD54406h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F871CD54415h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A06E6D second address: A06E73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A06E73 second address: A06E82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A06E82 second address: A06E86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A068EE second address: A06900 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Ch 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A069F4 second address: A069FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A069FA second address: A06A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jno 00007F871CD54408h 0x0000000b jmp 00007F871CD5440Fh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push edi 0x00000015 pop edi 0x00000016 push eax 0x00000017 pop eax 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b push eax 0x0000001c push ecx 0x0000001d pop ecx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A06A26 second address: A06A2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A8DA second address: A0A900 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD54419h 0x00000009 popad 0x0000000a jc 00007F871CD5440Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A900 second address: A0A904 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A904 second address: A0A90C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A90C second address: A0A910 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A476 second address: A0A47C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A47C second address: A0A4A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnp 00007F871CC39A0Dh 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A5EC second address: A0A603 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54413h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A603 second address: A0A630 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F871CC39A02h 0x0000000a jmp 00007F871CC399FCh 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A630 second address: A0A636 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A636 second address: A0A64D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007F871CC39A02h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A0A64D second address: A0A65D instructions: 0x00000000 rdtsc 0x00000002 jc 00007F871CD54412h 0x00000008 jbe 00007F871CD54406h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A182B4 second address: A182C5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F871CC399FBh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A182C5 second address: A182CF instructions: 0x00000000 rdtsc 0x00000002 jng 00007F871CD54412h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A182CF second address: A182D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A1F924 second address: A1F92A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A1F92A second address: A1F930 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A1F930 second address: A1F935 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A23F6C second address: A23F70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A2452B second address: A2454A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F871CD54419h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A247CA second address: A247D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A247D2 second address: A247D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A2523A second address: A25258 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F871CC39A09h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A25258 second address: A25264 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A2919E second address: A291C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F871CC39A00h 0x0000000a jno 00007F871CC399FCh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A291C6 second address: A291CC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A28D03 second address: A28D14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 js 00007F871CC399FEh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A28D14 second address: A28D18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A28D18 second address: A28D25 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F871CC399F6h 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A2C39C second address: A2C3A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A2C3A0 second address: A2C3AC instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F871CC399F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A2C3AC second address: A2C3D1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F871CD5440Ch 0x00000008 jne 00007F871CD54406h 0x0000000e pushad 0x0000000f jmp 00007F871CD54412h 0x00000014 push edi 0x00000015 pop edi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A3B71F second address: A3B725 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A3B725 second address: A3B729 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A3B729 second address: A3B740 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FFh 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A3DAD4 second address: A3DADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F871CD54406h 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A3DADF second address: A3DB2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ebx 0x0000000b jmp 00007F871CC39A04h 0x00000010 jng 00007F871CC399F6h 0x00000016 pop ebx 0x00000017 jmp 00007F871CC39A00h 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A3DB2A second address: A3DB32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A4FA3F second address: A4FA4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F871CC399F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A4FA4B second address: A4FA4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A4FA4F second address: A4FA53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A4F5C6 second address: A4F5D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CD5440Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A4F5D9 second address: A4F5EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A01h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A678D6 second address: A678EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD54411h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A678EB second address: A678EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A67B5B second address: A67B7A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F871CD54418h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A67CC2 second address: A67CD6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A00h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A67CD6 second address: A67D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F871CD54417h 0x0000000b jp 00007F871CD5441Bh 0x00000011 push edx 0x00000012 pop edx 0x00000013 jmp 00007F871CD54413h 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A68443 second address: A68466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CC39A07h 0x00000009 popad 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A68466 second address: A68481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F871CD54412h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A68481 second address: A684B0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F871CC399F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F871CC39A06h 0x0000000f pushad 0x00000010 jnc 00007F871CC399F6h 0x00000016 ja 00007F871CC399F6h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A6876F second address: A6877C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F871CD54406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A6B65F second address: A6B663 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A6E97E second address: A6E983 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A6E983 second address: A6E998 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC399FBh 0x00000009 jnp 00007F871CC399F6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A6E538 second address: A6E54E instructions: 0x00000000 rdtsc 0x00000002 jg 00007F871CD54406h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 popad 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A6E54E second address: A6E552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A70451 second address: A70456 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: A70456 second address: A7045C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120E0D second address: 5120E11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120E11 second address: 5120E22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120E22 second address: 5120E47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, cx 0x00000006 mov ebx, esi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F871CD54412h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120E47 second address: 5120E4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120E4B second address: 5120E67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54418h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120E67 second address: 5120E85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ebx, 31AA4F26h 0x00000012 mov ebx, 4EDC37B2h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160F93 second address: 5160FC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 7A94h 0x00000007 push edx 0x00000008 pop ecx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e mov al, BEh 0x00000010 mov edx, 3C6DB0C4h 0x00000015 popad 0x00000016 xchg eax, ebp 0x00000017 jmp 00007F871CD54413h 0x0000001c mov ebp, esp 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51000CB second address: 51000DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC399FEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51000DD second address: 51000E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120BB0 second address: 5120BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushfd 0x00000008 jmp 00007F871CC39A05h 0x0000000d sbb cx, 5FC6h 0x00000012 jmp 00007F871CC39A01h 0x00000017 popfd 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51206FF second address: 5120743 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 movsx edi, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F871CD54414h 0x00000011 push eax 0x00000012 pushad 0x00000013 jmp 00007F871CD54411h 0x00000018 push eax 0x00000019 push edx 0x0000001a call 00007F871CD5440Eh 0x0000001f pop esi 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51205EB second address: 5120673 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F871CC39A08h 0x00000008 and esi, 7C4F5BC8h 0x0000000e jmp 00007F871CC399FBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushfd 0x00000017 jmp 00007F871CC39A08h 0x0000001c xor ax, 5E28h 0x00000021 jmp 00007F871CC399FBh 0x00000026 popfd 0x00000027 popad 0x00000028 xchg eax, ebp 0x00000029 pushad 0x0000002a mov cx, 163Bh 0x0000002e mov ebx, esi 0x00000030 popad 0x00000031 push eax 0x00000032 jmp 00007F871CC399FDh 0x00000037 xchg eax, ebp 0x00000038 jmp 00007F871CC399FEh 0x0000003d mov ebp, esp 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120673 second address: 5120690 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51302EC second address: 51302F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51302F2 second address: 51302F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160EB1 second address: 5160F02 instructions: 0x00000000 rdtsc 0x00000002 mov di, DC66h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 call 00007F871CC39A07h 0x0000000d pushfd 0x0000000e jmp 00007F871CC39A08h 0x00000013 add ch, 00000038h 0x00000016 jmp 00007F871CC399FBh 0x0000001b popfd 0x0000001c pop esi 0x0000001d popad 0x0000001e push esi 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 mov si, 4767h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160F02 second address: 5160F2F instructions: 0x00000000 rdtsc 0x00000002 mov si, F303h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 call 00007F871CD54418h 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 popad 0x00000011 mov dword ptr [esp], ebp 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160F2F second address: 5160F33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160F33 second address: 5160F39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160F39 second address: 5160F3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160F3F second address: 5160F43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160F43 second address: 5160F47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51403CF second address: 5140440 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F871CD5440Ch 0x00000008 or ecx, 55F78588h 0x0000000e jmp 00007F871CD5440Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 push eax 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F871CD5440Fh 0x0000001f jmp 00007F871CD54413h 0x00000024 popfd 0x00000025 mov edx, ecx 0x00000027 popad 0x00000028 xchg eax, ebp 0x00000029 jmp 00007F871CD54412h 0x0000002e mov ebp, esp 0x00000030 pushad 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007F871CD5440Ch 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5140440 second address: 51404D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bh, 81h 0x00000006 popad 0x00000007 mov eax, dword ptr [ebp+08h] 0x0000000a jmp 00007F871CC39A08h 0x0000000f and dword ptr [eax], 00000000h 0x00000012 pushad 0x00000013 call 00007F871CC399FEh 0x00000018 mov ebx, esi 0x0000001a pop ecx 0x0000001b mov dx, 9352h 0x0000001f popad 0x00000020 and dword ptr [eax+04h], 00000000h 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007F871CC39A02h 0x0000002d adc esi, 74AED168h 0x00000033 jmp 00007F871CC399FBh 0x00000038 popfd 0x00000039 pushfd 0x0000003a jmp 00007F871CC39A08h 0x0000003f and cx, 23C8h 0x00000044 jmp 00007F871CC399FBh 0x00000049 popfd 0x0000004a popad 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 512051B second address: 5120538 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CD54419h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120538 second address: 51205BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d call 00007F871CC399FCh 0x00000012 pushfd 0x00000013 jmp 00007F871CC39A02h 0x00000018 sbb eax, 2A023248h 0x0000001e jmp 00007F871CC399FBh 0x00000023 popfd 0x00000024 pop ecx 0x00000025 pushad 0x00000026 mov si, di 0x00000029 pushad 0x0000002a popad 0x0000002b popad 0x0000002c popad 0x0000002d push eax 0x0000002e jmp 00007F871CC399FEh 0x00000033 xchg eax, ebp 0x00000034 pushad 0x00000035 mov ecx, 58D1A2FDh 0x0000003a push eax 0x0000003b pushad 0x0000003c popad 0x0000003d pop edi 0x0000003e popad 0x0000003f mov ebp, esp 0x00000041 push eax 0x00000042 push edx 0x00000043 jmp 00007F871CC39A01h 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130EA1 second address: 5130EBC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54417h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130EBC second address: 5130ED4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC39A04h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130ED4 second address: 5130EFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007F871CD5440Ch 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F871CD5440Ah 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130EFA second address: 5130F00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130F00 second address: 5130F06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130F06 second address: 5130F0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130F0A second address: 5130F2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d call 00007F871CD54411h 0x00000012 pop esi 0x00000013 mov ebx, 018B9014h 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5130F2F second address: 5130F56 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, eax 0x00000005 jmp 00007F871CC39A04h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov si, bx 0x00000014 movsx ebx, cx 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51401E8 second address: 5140203 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CD54417h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5140203 second address: 5140207 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5140207 second address: 514022B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F871CD54412h 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov ch, CDh 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51605B1 second address: 516060B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F871CC399FEh 0x0000000f push eax 0x00000010 jmp 00007F871CC399FBh 0x00000015 xchg eax, ecx 0x00000016 jmp 00007F871CC39A06h 0x0000001b mov eax, dword ptr [777265FCh] 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 516060B second address: 516060F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 516060F second address: 5160615 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160615 second address: 516064E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, 0F01D8E1h 0x00000008 movzx esi, di 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test eax, eax 0x00000010 jmp 00007F871CD54419h 0x00000015 je 00007F878F29772Eh 0x0000001b pushad 0x0000001c movzx esi, dx 0x0000001f push eax 0x00000020 push edx 0x00000021 mov bx, D74Ah 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 516064E second address: 516072F instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F871CC399FBh 0x00000008 and ax, D9EEh 0x0000000d jmp 00007F871CC39A09h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 mov ecx, eax 0x00000018 jmp 00007F871CC399FEh 0x0000001d xor eax, dword ptr [ebp+08h] 0x00000020 pushad 0x00000021 movzx ecx, dx 0x00000024 popad 0x00000025 and ecx, 1Fh 0x00000028 pushad 0x00000029 pushad 0x0000002a pushfd 0x0000002b jmp 00007F871CC399FCh 0x00000030 adc cx, EBC8h 0x00000035 jmp 00007F871CC399FBh 0x0000003a popfd 0x0000003b popad 0x0000003c pushfd 0x0000003d jmp 00007F871CC39A08h 0x00000042 or ax, EE28h 0x00000047 jmp 00007F871CC399FBh 0x0000004c popfd 0x0000004d popad 0x0000004e ror eax, cl 0x00000050 jmp 00007F871CC39A06h 0x00000055 leave 0x00000056 pushad 0x00000057 mov dx, ax 0x0000005a push eax 0x0000005b push edx 0x0000005c pushfd 0x0000005d jmp 00007F871CC39A08h 0x00000062 xor eax, 233002E8h 0x00000068 jmp 00007F871CC399FBh 0x0000006d popfd 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 516072F second address: 5160743 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 retn 0004h 0x00000008 nop 0x00000009 mov esi, eax 0x0000000b lea eax, dword ptr [ebp-08h] 0x0000000e xor esi, dword ptr [007C2014h] 0x00000014 push eax 0x00000015 push eax 0x00000016 push eax 0x00000017 lea eax, dword ptr [ebp-10h] 0x0000001a push eax 0x0000001b call 00007F8721734B4Dh 0x00000020 push FFFFFFFEh 0x00000022 pushad 0x00000023 movsx edx, si 0x00000026 push eax 0x00000027 push edx 0x00000028 mov ax, 94A9h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160743 second address: 5160762 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F871CC39A07h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160762 second address: 516077A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CD54414h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 516077A second address: 5160830 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ret 0x0000000c nop 0x0000000d push eax 0x0000000e call 00007F872161A18Bh 0x00000013 mov edi, edi 0x00000015 jmp 00007F871CC39A06h 0x0000001a xchg eax, ebp 0x0000001b jmp 00007F871CC39A00h 0x00000020 push eax 0x00000021 jmp 00007F871CC399FBh 0x00000026 xchg eax, ebp 0x00000027 jmp 00007F871CC39A06h 0x0000002c mov ebp, esp 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007F871CC399FEh 0x00000035 xor cl, FFFFFFF8h 0x00000038 jmp 00007F871CC399FBh 0x0000003d popfd 0x0000003e pushfd 0x0000003f jmp 00007F871CC39A08h 0x00000044 jmp 00007F871CC39A05h 0x00000049 popfd 0x0000004a popad 0x0000004b pop ebp 0x0000004c push eax 0x0000004d push edx 0x0000004e pushad 0x0000004f mov esi, edx 0x00000051 popad 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160830 second address: 5160836 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5160836 second address: 516083A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110006 second address: 5110029 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 movzx esi, di 0x00000008 popad 0x00000009 push esi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F871CD54416h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110029 second address: 5110095 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F871CC39A02h 0x00000008 xor ecx, 5B757A78h 0x0000000e jmp 00007F871CC399FBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 mov ah, EDh 0x00000018 popad 0x00000019 mov dword ptr [esp], ebp 0x0000001c jmp 00007F871CC399FBh 0x00000021 mov ebp, esp 0x00000023 jmp 00007F871CC39A06h 0x00000028 and esp, FFFFFFF8h 0x0000002b jmp 00007F871CC39A00h 0x00000030 xchg eax, ecx 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 pushad 0x00000035 popad 0x00000036 popad 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110095 second address: 5110129 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F871CD54415h 0x00000009 or si, C5D6h 0x0000000e jmp 00007F871CD54411h 0x00000013 popfd 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a pushad 0x0000001b mov dx, F8E0h 0x0000001f jmp 00007F871CD54419h 0x00000024 popad 0x00000025 xchg eax, ecx 0x00000026 jmp 00007F871CD5440Eh 0x0000002b xchg eax, ebx 0x0000002c jmp 00007F871CD54410h 0x00000031 push eax 0x00000032 jmp 00007F871CD5440Bh 0x00000037 xchg eax, ebx 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b call 00007F871CD5440Bh 0x00000040 pop eax 0x00000041 pushad 0x00000042 popad 0x00000043 popad 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110129 second address: 511015D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A04h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [ebp+10h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F871CC39A07h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 511015D second address: 5110163 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110163 second address: 5110167 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110167 second address: 51101F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007F871CD54416h 0x00000011 push eax 0x00000012 jmp 00007F871CD5440Bh 0x00000017 xchg eax, esi 0x00000018 pushad 0x00000019 push ecx 0x0000001a push ebx 0x0000001b pop esi 0x0000001c pop ebx 0x0000001d push ecx 0x0000001e mov esi, edi 0x00000020 pop edx 0x00000021 popad 0x00000022 mov esi, dword ptr [ebp+08h] 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007F871CD54417h 0x0000002e add ecx, 4DDFFFFEh 0x00000034 jmp 00007F871CD54419h 0x00000039 popfd 0x0000003a call 00007F871CD54410h 0x0000003f pop eax 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51101F6 second address: 5110211 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC39A07h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110211 second address: 5110279 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, edi 0x0000000c jmp 00007F871CD5440Eh 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 movzx eax, bx 0x00000018 pushfd 0x00000019 jmp 00007F871CD54419h 0x0000001e sbb eax, 178DB656h 0x00000024 jmp 00007F871CD54411h 0x00000029 popfd 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110279 second address: 5110289 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC399FCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110289 second address: 511028D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 511028D second address: 5110323 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, edi 0x00000009 pushad 0x0000000a mov cx, dx 0x0000000d call 00007F871CC39A09h 0x00000012 jmp 00007F871CC39A00h 0x00000017 pop eax 0x00000018 popad 0x00000019 test esi, esi 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F871CC39A07h 0x00000022 or cx, 524Eh 0x00000027 jmp 00007F871CC39A09h 0x0000002c popfd 0x0000002d mov edx, eax 0x0000002f popad 0x00000030 je 00007F878F1C7D09h 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007F871CC39A09h 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51006ED second address: 51007A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54411h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F871CD5440Eh 0x0000000f push eax 0x00000010 pushad 0x00000011 call 00007F871CD54411h 0x00000016 pushfd 0x00000017 jmp 00007F871CD54410h 0x0000001c adc si, C418h 0x00000021 jmp 00007F871CD5440Bh 0x00000026 popfd 0x00000027 pop esi 0x00000028 pushad 0x00000029 mov esi, edx 0x0000002b pushfd 0x0000002c jmp 00007F871CD5440Bh 0x00000031 sbb ax, 08DEh 0x00000036 jmp 00007F871CD54419h 0x0000003b popfd 0x0000003c popad 0x0000003d popad 0x0000003e xchg eax, ebp 0x0000003f jmp 00007F871CD5440Eh 0x00000044 mov ebp, esp 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007F871CD54417h 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51007A1 second address: 51007C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, cx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b and esp, FFFFFFF8h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F871CC39A06h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51007C9 second address: 51007D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51007D8 second address: 5100823 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F871CC399FCh 0x00000011 sub eax, 14070F28h 0x00000017 jmp 00007F871CC399FBh 0x0000001c popfd 0x0000001d mov ecx, 21DEEC1Fh 0x00000022 popad 0x00000023 push eax 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100823 second address: 5100827 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100827 second address: 510082D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 510082D second address: 5100833 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100833 second address: 510084B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 510084B second address: 5100866 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54417h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100866 second address: 5100891 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov edi, 7E3173DEh 0x00000012 mov di, EFEAh 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100891 second address: 510093D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54410h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F871CD5440Bh 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 mov dx, ax 0x00000014 pushfd 0x00000015 jmp 00007F871CD54410h 0x0000001a sbb cl, 00000008h 0x0000001d jmp 00007F871CD5440Bh 0x00000022 popfd 0x00000023 popad 0x00000024 mov esi, dword ptr [ebp+08h] 0x00000027 jmp 00007F871CD54416h 0x0000002c sub ebx, ebx 0x0000002e pushad 0x0000002f mov ax, dx 0x00000032 mov eax, edx 0x00000034 popad 0x00000035 test esi, esi 0x00000037 pushad 0x00000038 pushfd 0x00000039 jmp 00007F871CD5440Bh 0x0000003e and esi, 3F9FB8AEh 0x00000044 jmp 00007F871CD54419h 0x00000049 popfd 0x0000004a push esi 0x0000004b mov di, CFC2h 0x0000004f pop edi 0x00000050 popad 0x00000051 je 00007F878F2E9E65h 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a mov bh, E8h 0x0000005c mov dl, ch 0x0000005e popad 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 510093D second address: 5100956 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC39A05h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100956 second address: 510096B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000000f pushad 0x00000010 mov ah, bh 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 510096B second address: 51009B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 mov ecx, esi 0x00000008 pushad 0x00000009 jmp 00007F871CC399FAh 0x0000000e jmp 00007F871CC39A02h 0x00000013 popad 0x00000014 je 00007F878F1CF408h 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F871CC39A07h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51009B0 second address: 51009FE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54419h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test byte ptr [77726968h], 00000002h 0x00000010 pushad 0x00000011 mov ebx, ecx 0x00000013 mov edx, ecx 0x00000015 popad 0x00000016 jne 00007F878F2E9DE2h 0x0000001c pushad 0x0000001d push esi 0x0000001e pushad 0x0000001f popad 0x00000020 pop ebx 0x00000021 movzx ecx, dx 0x00000024 popad 0x00000025 mov edx, dword ptr [ebp+0Ch] 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F871CD54410h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51009FE second address: 5100A18 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ecx, edi 0x0000000f mov dx, 39B2h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A18 second address: 5100A2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CD5440Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A2B second address: 5100A2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A2F second address: 5100A3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A3E second address: 5100A42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A42 second address: 5100A53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A53 second address: 5100A78 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC39A01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F871CC399FDh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A78 second address: 5100A7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A7E second address: 5100A8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A8D second address: 5100A91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A91 second address: 5100A95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A95 second address: 5100A9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100A9B second address: 5100AA1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100AA1 second address: 5100AA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100B2B second address: 5100B9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F871CC399FFh 0x00000008 mov dx, cx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop esi 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F871CC39A00h 0x00000016 jmp 00007F871CC39A05h 0x0000001b popfd 0x0000001c jmp 00007F871CC39A00h 0x00000021 popad 0x00000022 pop ebx 0x00000023 jmp 00007F871CC39A00h 0x00000028 mov esp, ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F871CC399FAh 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100B9E second address: 5100BA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5100BA4 second address: 5100BD0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CC399FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F871CC39A07h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110CD8 second address: 5110D2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushfd 0x00000007 jmp 00007F871CD54415h 0x0000000c adc eax, 7CAAF7E6h 0x00000012 jmp 00007F871CD54411h 0x00000017 popfd 0x00000018 pop esi 0x00000019 popad 0x0000001a push eax 0x0000001b pushad 0x0000001c mov bx, cx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F871CD54416h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D2B second address: 5110D3A instructions: 0x00000000 rdtsc 0x00000002 mov dx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D3A second address: 5110D3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D3E second address: 5110D44 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D44 second address: 5110D7A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F871CD5440Eh 0x00000009 jmp 00007F871CD54415h 0x0000000e popfd 0x0000000f movzx esi, di 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov ebp, esp 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D7A second address: 5110D80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D80 second address: 5110D8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CD5440Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D8E second address: 5110D92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5110D92 second address: 5110DA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F871CD5440Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51109EB second address: 51109EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51109EF second address: 51109F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51109F3 second address: 51109F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5190755 second address: 5190759 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5190759 second address: 519075F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 519075F second address: 519079C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD54414h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F871CD5440Ch 0x00000013 xor ax, 4598h 0x00000018 jmp 00007F871CD5440Bh 0x0000001d popfd 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 519079C second address: 5190806 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 pushfd 0x00000007 jmp 00007F871CC39A01h 0x0000000c jmp 00007F871CC399FBh 0x00000011 popfd 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 xchg eax, ebp 0x00000016 jmp 00007F871CC39A06h 0x0000001b mov ebp, esp 0x0000001d jmp 00007F871CC39A00h 0x00000022 pop ebp 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F871CC39A07h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5180893 second address: 51808A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F871CD5440Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51808A2 second address: 51808A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51808A8 second address: 51808AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51808AC second address: 51808C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F871CC399FCh 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 51808C8 second address: 5180917 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dx, cx 0x00000007 popad 0x00000008 pushfd 0x00000009 jmp 00007F871CD54416h 0x0000000e adc ah, 00000068h 0x00000011 jmp 00007F871CD5440Bh 0x00000016 popfd 0x00000017 popad 0x00000018 mov ebp, esp 0x0000001a jmp 00007F871CD54416h 0x0000001f pop ebp 0x00000020 pushad 0x00000021 mov ebx, ecx 0x00000023 push eax 0x00000024 push edx 0x00000025 mov edi, eax 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5180917 second address: 518091B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5120186 second address: 512018C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\DRWgoZo325.exe | RDTSC instruction interceptor: First address: 5180B5C second address: 5180B74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F871CC39A04h 0x00000009 rdtsc |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8048 | Thread sleep count: 35 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8048 | Thread sleep time: -70035s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 6004 | Thread sleep count: 1339 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 6004 | Thread sleep time: -2679339s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7192 | Thread sleep count: 221 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7192 | Thread sleep time: -6630000s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 5752 | Thread sleep count: 1227 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 5752 | Thread sleep time: -2455227s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8004 | Thread sleep time: -540000s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 6080 | Thread sleep count: 1228 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 6080 | Thread sleep time: -2457228s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 6120 | Thread sleep count: 1347 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 6120 | Thread sleep time: -2695347s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 5612 | Thread sleep count: 46 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 5612 | Thread sleep time: -92046s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 6036 | Thread sleep count: 46 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 6036 | Thread sleep time: -92046s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 5876 | Thread sleep count: 36 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 5876 | Thread sleep time: -72036s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 1472 | Thread sleep time: -36000s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 5924 | Thread sleep count: 47 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 5924 | Thread sleep time: -94047s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 6172 | Thread sleep time: -58029s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 6168 | Thread sleep count: 45 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 6168 | Thread sleep time: -90045s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4072 | Thread sleep count: 52 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4072 | Thread sleep time: -104052s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4064 | Thread sleep count: 44 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4064 | Thread sleep time: -88044s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4016 | Thread sleep count: 44 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4016 | Thread sleep time: -88044s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 3008 | Thread sleep count: 367 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 3008 | Thread sleep time: -2202000s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4056 | Thread sleep count: 53 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4056 | Thread sleep time: -106053s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 3392 | Thread sleep count: 50 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 3392 | Thread sleep time: -100050s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4332 | Thread sleep count: 50 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 4332 | Thread sleep time: -100050s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 3952 | Thread sleep count: 49 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 3952 | Thread sleep time: -98049s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 5976 | Thread sleep time: -46023s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 6680 | Thread sleep time: -48024s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 5460 | Thread sleep time: -46023s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 1028 | Thread sleep time: -32000s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 3444 | Thread sleep count: 76 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 5452 | Thread sleep time: -36018s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 364 | Thread sleep time: -36018s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 5140 | Thread sleep time: -46023s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009136001\daf7989e83.exe TID: 7020 | Thread sleep time: -44022s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 1956 | Thread sleep time: -34017s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 1892 | Thread sleep time: -34017s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 1844 | Thread sleep count: 211 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 1844 | Thread sleep time: -1266000s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe TID: 2040 | Thread sleep time: -30015s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1009137001\7d4f3b6a88.exe TID: 6472 | Thread sleep time: -922337203685477s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4040 | Thread sleep count: 1056 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4040 | Thread sleep time: -2113056s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 7624 | Thread sleep count: 1093 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 7624 | Thread sleep time: -2187093s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2628 | Thread sleep count: 1060 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2628 | Thread sleep time: -2121060s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1668 | Thread sleep count: 1072 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1668 | Thread sleep time: -2145072s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2588 | Thread sleep count: 1075 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2588 | Thread sleep time: -2151075s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6552 | Thread sleep count: 222 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6552 | Thread sleep time: -6660000s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6892 | Thread sleep count: 1017 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6892 | Thread sleep time: -2035017s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 6888 | Thread sleep count: 9058 > 30 | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -23980767295822402s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -600000s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599887s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599780s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599672s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599562s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599453s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599344s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599234s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599122s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -599014s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598906s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598797s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598686s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598578s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598468s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598359s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598249s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598140s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -598027s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -597922s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -597812s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -597672s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -597538s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -597110s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596985s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596860s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596735s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596610s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596485s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596360s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596235s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -596110s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595985s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595860s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595735s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595610s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595485s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595360s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595235s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -595110s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -594980s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -594838s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -594431s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -594313s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -594200s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -594094s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593984s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593865s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593750s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593640s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593529s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593419s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593312s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023609001\64T69R7.exe TID: 4776 | Thread sleep time: -593203s >= -30000s | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4252 | Thread sleep time: -7378697629483816s >= -30000s | |
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2596 | Thread sleep time: -922337203685477s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 5404 | Thread sleep time: -62031s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 1860 | Thread sleep time: -74037s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 3792 | Thread sleep time: -40000s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 8092 | Thread sleep time: -74037s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 636 | Thread sleep time: -54027s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 4024 | Thread sleep time: -240000s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 1820 | Thread sleep time: -56028s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 8096 | Thread sleep time: -58029s >= -30000s | |
Source: C:\Users\user\AppData\Local\Temp\1023742001\b016a3d9d5.exe TID: 7904 | Thread sleep time: -50025s >= -30000s | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 3700 | Thread sleep count: 5249 > 30 | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 3700 | Thread sleep time: -5249000s >= -30000s | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 4684 | Thread sleep count: 4643 > 30 | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 4684 | Thread sleep time: -4643000s >= -30000s | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 7108 | Thread sleep time: -180000s >= -30000s | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 8180 | Thread sleep count: 32 > 30 | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 1504 | Thread sleep time: -30000s >= -30000s | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe TID: 1504 | Thread sleep time: -30000s >= -30000s | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite-shm | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\logins.json | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite-wal | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cert9.db | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite-shm | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\prefs.js | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqlite | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\formhistory.sqlite | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | |
Source: C:\Users\user\AppData\Local\Temp\1009134001\32ff2fbd90.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite-wal | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.db | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cnywnayy_638708640251469628.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | |