Source: | Binary string: devco n.pdbo source: hfrR6WOIt6.exe |
Source: | Binary string: wntdll.pdbUGP source: hfrR6WOIt6.exe, 00000000.00000002.2633232483.000000000302A000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1379223534.0000000002E78000.00000004.00000020.00020000.00000000.sdmp, 690735.tmp.0.dr |
Source: | Binary string: wntdll.pdb source: hfrR6WOIt6.exe, 00000000.00000002.2633232483.000000000302A000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1379223534.0000000002E78000.00000004.00000020.00020000.00000000.sdmp, 690735.tmp.0.dr |
Source: | Binary string: wuser32.pdb source: hfrR6WOIt6.exe, 00000000.00000002.2633391536.00000000031D8000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1380286735.0000000002E70000.00000004.00000020.00020000.00000000.sdmp, 6907a2.tmp.0.dr |
Source: | Binary string: DrvInDM U.pdbe source: hfrR6WOIt6.exe |
Source: | Binary string: wuser32.pdbUGP source: hfrR6WOIt6.exe, 00000000.00000002.2633391536.00000000031D8000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1380286735.0000000002E70000.00000004.00000020.00020000.00000000.sdmp, 6907a2.tmp.0.dr |
Source: | Binary string: devc@on.pdb source: hfrR6WOIt6.exe |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], esp | 0_2_1000710E |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], esp | 0_2_1000710E |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-28h], esp | 0_2_1000710E |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], esp | 0_2_1000710E |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_1001A199 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_1000833D |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], esp | 0_2_100193C2 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-24h], esp | 0_2_100193C2 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_10022A80 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-04h], esp | 0_2_10018AD3 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-04h], esp | 0_2_10018AD3 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_10006C96 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_10007DB8 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-04h], esp | 0_2_10018EEA |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-0Ch], esp | 0_2_10007FDD |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_1001A031 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_10006051 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_10006051 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-04h], esp | 0_2_10014096 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-04h], esp | 0_2_10014096 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-14h], esp | 0_2_1000210D |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-14h], esp | 0_2_1000210D |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 4x nop then cmp dword ptr [ebp-10h], esp | 0_2_10003116 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://110.40.39.178:234/?1080 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://124.248.65.63:234 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://124.248.65.63:234C: |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://124.248.65.63:3842 |
Source: hfrR6WOIt6.exe, 00000000.00000002.2632430053.0000000000C53000.00000004.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000002.2633745767.0000000003BCA000.00000004.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.2010464176.0000000003BE1000.00000004.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000002.2633857634.0000000003BE4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://124.248.65.63:3842/ |
Source: hfrR6WOIt6.exe, 00000000.00000002.2633745767.0000000003BCA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://124.248.65.63:3842/- |
Source: hfrR6WOIt6.exe, 00000000.00000002.2632430053.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://124.248.65.63:3842P |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://124.248.65.63:3842SeDebugPrivilege |
Source: hfrR6WOIt6.exe, 00000000.00000002.2632430053.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://124.248.65.63:3842odu |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://124.248.65.63:3843/Miku.exe |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://124.248.65.63:3843/Miku.exehttp://124.248.65.63:3843/mz |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://124.248.65.63:3843/mz |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://https://Mozilla/5.0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ocsp.t |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ocsps.ssl.com0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ocsps.ssl.com0Q |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://s.symcb.com/universal-root.crl0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://s.symcd.com06 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://sf.symc |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0( |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ts-ocsp.ws.s |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ts-ocsp.ws.symantec. |
Source: hfrR6WOIt6.exe | String found in binary or memory: http://ts-ocsp.ws.symantec.com0; |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://d.symcb.com/cps0% |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://d.symcb.com/rpa0 |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://d.symcb.com/rpa0. |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://hcnydh4xlnv7.feishu.cn/wiki/E52swZAMCikXIikA4IkcM94knrh |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://hcnydh4xlnv7.feishu.cn/wiki/E52swZAMCikXIikA4IkcM94knrhhttps://hcnydh4xlnv7.feishu.cn/wiki/I |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://hcnydh4xlnv7.feishu.cn/wiki/IfcvwVKXtiAeZ7kWMA3cyH3Anfh |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://ww(w.v |
Source: hfrR6WOIt6.exe | String found in binary or memory: https://www.ssl.com/repository0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2D330 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B2D330 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B32AD0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B32AD0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B27A30 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B27A30 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B262B0 IsWindowEnabled,SendMessageA,NtdllDefWindowProc_A, | 0_2_02B262B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B26210 IsWindowEnabled,SendMessageA,SendMessageA,SendMessageA,IsZoomed,SendMessageA,NtdllDefWindowProc_A, | 0_2_02B26210 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2C3F0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,CallWindowProcA,GetCursorPos,GetWindowRect,PtInRect,CallWindowProcA, | 0_2_02B2C3F0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B3D330 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B3D330 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B28310 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA, | 0_2_02B28310 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B41370 GetPropA,NtdllDefWindowProc_A,IsWindowVisible,ShowWindow,NtdllDefWindowProc_A,NtdllDefWindowProc_A,SendMessageA, | 0_2_02B41370 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B26350 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B26350 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B29340 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,CallWindowProcA,GetCursorPos,GetWindowRect,PtInRect,CallWindowProcA, | 0_2_02B29340 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B26010 IsWindowEnabled,SendMessageA,SendMessageA,GetWindowRect,IsRectEmpty,PtInRect,PtInRect,GetSystemMenu,GetMenuState,SendMessageA,NtdllDefWindowProc_A,PtInRect,IsIconic,PtInRect,IsZoomed,PtInRect,PtInRect,GetWindowRect, | 0_2_02B26010 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B31630 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,CallWindowProcA, | 0_2_02B31630 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B34790 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B34790 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B3E7F0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B3E7F0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B28710 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,GetParent, | 0_2_02B28710 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2F750 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B2F750 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B414B0 GetPropA,NtdllDefWindowProc_A, | 0_2_02B414B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2E440 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B2E440 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B24510 NtdllDefWindowProc_A, | 0_2_02B24510 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B26560 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B26560 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2DA90 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B2DA90 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B32BF0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B32BF0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B24BD0 NtdllDefWindowProc_A, | 0_2_02B24BD0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2CBC0 GetPropA,NtdllDefWindowProc_A, | 0_2_02B2CBC0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B40B70 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B40B70 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B298B0 GetPropA,NtdllDefWindowProc_A,KillTimer,IsWindowVisible,IsIconic,SetTimer, | 0_2_02B298B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B248E0 NtdllDefWindowProc_A, | 0_2_02B248E0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B3D8E0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA, | 0_2_02B3D8E0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B3C800 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B3C800 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B25900 IsWindowEnabled,EnableWindow,NtdllDefWindowProc_A, | 0_2_02B25900 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B25940 GetCursorPos,GetWindowRect,PtInRect,PtInRect,PtInRect,PtInRect,PtInRect,KillTimer,NtdllDefWindowProc_A, | 0_2_02B25940 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B34EA0 GetPropA,NtdllDefWindowProc_A, | 0_2_02B34EA0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B3FEA0 GetPropA,NtdllDefWindowProc_A,InvalidateRect,CallWindowProcA, | 0_2_02B3FEA0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B22E40 NtdllDefWindowProc_A, | 0_2_02B22E40 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B28CB0 GetPropA,NtdllDefWindowProc_A, | 0_2_02B28CB0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B33DA0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B33DA0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2FD50 GetPropA,NtdllDefWindowProc_A,CallWindowProcA, | 0_2_02B2FD50 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B3FD50 GetPropA,GetPropA,NtdllDefWindowProc_A,FindWindowExA,GetPropA,GetWindowRect, | 0_2_02B3FD50 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B28D40 GetPropA,RemovePropA,CallWindowProcA,NtdllDefWindowProc_A, | 0_2_02B28D40 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_10007FDD NtClose, | 0_2_10007FDD |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004B0690 | 0_2_004B0690 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00557647 | 0_2_00557647 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004C3810 | 0_2_004C3810 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053A043 | 0_2_0053A043 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A1C0BF | 0_2_00A1C0BF |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004CE150 | 0_2_004CE150 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053A2A3 | 0_2_0053A2A3 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053C3E3 | 0_2_0053C3E3 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053E4E6 | 0_2_0053E4E6 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00488574 | 0_2_00488574 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004EA600 | 0_2_004EA600 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053EA0A | 0_2_0053EA0A |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0041EB33 | 0_2_0041EB33 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0051CC00 | 0_2_0051CC00 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053ACCA | 0_2_0053ACCA |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053ED8A | 0_2_0053ED8A |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00551070 | 0_2_00551070 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0046F1D6 | 0_2_0046F1D6 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053D1F6 | 0_2_0053D1F6 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0054D476 | 0_2_0054D476 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053580E | 0_2_0053580E |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0053B950 | 0_2_0053B950 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00539920 | 0_2_00539920 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004C59B0 | 0_2_004C59B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00539D48 | 0_2_00539D48 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004CFF20 | 0_2_004CFF20 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B37540 | 0_2_02B37540 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B22250 | 0_2_02B22250 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B4939F | 0_2_02B4939F |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2B6E0 | 0_2_02B2B6E0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B37BA0 | 0_2_02B37BA0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B48B97 | 0_2_02B48B97 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B23970 | 0_2_02B23970 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B2EDA0 | 0_2_02B2EDA0 |
Source: hfrR6WOIt6.exe, 00000000.00000002.2631744207.0000000000566000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameSkinH_EL.dll vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe, 00000000.00000000.1373724578.000000000063D000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameSkinH_EL.dll vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe, 00000000.00000000.1373724578.0000000000566000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameSkinH_EL.dll vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe, 00000000.00000002.2633391536.0000000003280000.00000040.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameuser32j% vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe, 00000000.00000003.1379223534.0000000002F9B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe, 00000000.00000002.2632945900.0000000002B5C000.00000004.00000001.01000000.00000005.sdmp | Binary or memory string: OriginalFilenameSkinH_EL.dll vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe, 00000000.00000003.1380286735.0000000002E70000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameuser32j% vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe, 00000000.00000002.2633232483.0000000003157000.00000040.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs hfrR6WOIt6.exe |
Source: hfrR6WOIt6.exe | Binary or memory string: OriginalFilenameSkinH_EL.dll vs hfrR6WOIt6.exe |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: msimg32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: dciman32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: jscript.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: winhttpcom.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Section loaded: wldp.dll | Jump to behavior |
Source: | Binary string: devco n.pdbo source: hfrR6WOIt6.exe |
Source: | Binary string: wntdll.pdbUGP source: hfrR6WOIt6.exe, 00000000.00000002.2633232483.000000000302A000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1379223534.0000000002E78000.00000004.00000020.00020000.00000000.sdmp, 690735.tmp.0.dr |
Source: | Binary string: wntdll.pdb source: hfrR6WOIt6.exe, 00000000.00000002.2633232483.000000000302A000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1379223534.0000000002E78000.00000004.00000020.00020000.00000000.sdmp, 690735.tmp.0.dr |
Source: | Binary string: wuser32.pdb source: hfrR6WOIt6.exe, 00000000.00000002.2633391536.00000000031D8000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1380286735.0000000002E70000.00000004.00000020.00020000.00000000.sdmp, 6907a2.tmp.0.dr |
Source: | Binary string: DrvInDM U.pdbe source: hfrR6WOIt6.exe |
Source: | Binary string: wuser32.pdbUGP source: hfrR6WOIt6.exe, 00000000.00000002.2633391536.00000000031D8000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1380286735.0000000002E70000.00000004.00000020.00020000.00000000.sdmp, 6907a2.tmp.0.dr |
Source: | Binary string: devc@on.pdb source: hfrR6WOIt6.exe |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A1209B pushfd ; mov dword ptr [esp], ebx | 0_2_00A9529C |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A1209B pushfd ; mov dword ptr [esp], ebx | 0_2_00AAC7C8 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A1209B pushfd ; mov dword ptr [esp], 689F214Bh | 0_2_00ABE41E |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A120DA push dword ptr [esp+30h]; retn 0034h | 0_2_00A1210A |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A480DA push dword ptr [esp+2Ch]; retn 0030h | 0_2_00AE83E5 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00B3803A push dword ptr [esp+40h]; retn 0044h | 0_2_00B59ECF |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00AD41A9 push dword ptr [esp+3Ch]; retn 0040h | 0_2_00AD41D6 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A861AD push dword ptr [esp+50h]; retn 0054h | 0_2_00A861CA |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0041A16A push dword ptr [esp+44h]; retn 0048h | 0_2_0041A211 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00544110 push eax; ret | 0_2_0054413E |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00402116 pushfd ; mov dword ptr [esp], esi | 0_2_00402117 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00ABA12B push edi; mov dword ptr [esp], ebx | 0_2_00ABA176 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00B5C2EE push dword ptr [esp+2Ch]; retn 0034h | 0_2_00B5C311 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A603B3 push dword ptr [esp+14h]; retn 0018h | 0_2_00A603DC |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0040C301 pushfd ; mov dword ptr [esp], ebx | 0_2_0040CC8A |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0040C301 pushfd ; mov dword ptr [esp], ebx | 0_2_0040CC8A |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00B663C3 push dword ptr [esp+48h]; retn 004Ch | 0_2_00B663DB |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0042833B push dword ptr [esp+2Ch]; retn 0030h | 0_2_0042834A |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00A8E320 push dword ptr [esp+4Ch]; retn 0050h | 0_2_00A8E32B |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0041A3E6 push ebp; mov dword ptr [esp], ecx | 0_2_0041A3EA |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00AAC488 push dword ptr [esp+10h]; retn 0014h | 0_2_00AAC4E3 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00AA642B push dword ptr [esp+50h]; retn 0058h | 0_2_00AD3D8B |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0040C485 pushfd ; mov dword ptr [esp], edx | 0_2_0040C48C |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0040C49F push dword ptr [esp+30h]; retn 0034h | 0_2_0040C4B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0040A50B pushfd ; mov dword ptr [esp], 8811E59Fh | 0_2_0040A510 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0041A6F9 push FEA442D1h; mov dword ptr [esp], esi | 0_2_0041A700 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00AF667B push dword ptr [esp+40h]; retn 0044h | 0_2_00AF6688 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0041A754 push dword ptr [esp+44h]; retn 0048h | 0_2_0041A7D2 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0041A709 push dword ptr [esp+44h]; retn 0048h | 0_2_0041A7D2 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0041A787 push dword ptr [esp+44h]; retn 0048h | 0_2_0041A7D2 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_0040A790 push dword ptr [esp+30h]; retn 0034h | 0_2_0040C4B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,CloseHandle,CloseHandle,CloseHandle,DeviceIoControl,CloseHandle,CloseHandle, \\.\PhysicalDrive%d | 0_2_00516840 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_00516D90 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_005170B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_005173F0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,CloseHandle,CloseHandle,CloseHandle,DeviceIoControl,CloseHandle,CloseHandle, \\.\PhysicalDrive%d | 0_2_00516840 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_00516D90 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_005170B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: CreateFileA,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d | 0_2_005173F0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004C3810 IsWindow,IsIconic,SetActiveWindow,IsWindow,IsWindow,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,KiUserCallbackDispatcher,SetWindowPos,IsWindow,SendMessageA,SendMessageA,DestroyAcceleratorTable,IsWindow,IsWindow,IsWindow,IsWindow,IsWindow,GetParent,GetFocus,IsWindow,SendMessageA,IsWindow,GetFocus,SetFocus, | 0_2_004C3810 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_00542114 IsIconic,GetWindowPlacement,GetWindowRect, | 0_2_00542114 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_004CCF00 IsIconic,IsZoomed,LoadLibraryA,GetProcAddress,GetProcAddress,FreeLibrary,SystemParametersInfoA,IsWindow,ShowWindow, | 0_2_004CCF00 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B26010 IsWindowEnabled,SendMessageA,SendMessageA,GetWindowRect,IsRectEmpty,PtInRect,PtInRect,GetSystemMenu,GetMenuState,SendMessageA,NtdllDefWindowProc_A,PtInRect,IsIconic,PtInRect,IsZoomed,PtInRect,PtInRect,GetWindowRect, | 0_2_02B26010 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B43070 IsWindowVisible,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,IsRectEmpty,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsZoomed,IsRectEmpty, | 0_2_02B43070 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B43070 IsWindowVisible,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,IsRectEmpty,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsZoomed,IsRectEmpty, | 0_2_02B43070 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B45780 IsIconic,IsZoomed,IsRectEmpty,IsWindowVisible, | 0_2_02B45780 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B298B0 GetPropA,NtdllDefWindowProc_A,KillTimer,IsWindowVisible,IsIconic,SetTimer, | 0_2_02B298B0 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B41800 IsZoomed,SendMessageA,IsIconic,SendMessageA,SendMessageA,GetSystemMenu,GetMenuState,SendMessageA,SendMessageA,KillTimer,GetMenuItemID,SendMessageA,CallWindowProcA, | 0_2_02B41800 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | Code function: 0_2_02B24E30 IsWindowVisible,GetWindowRect,SelectObject,SelectObject,SetBkMode,SelectObject,SetTextColor,DrawIconEx,GetWindowTextA,DrawTextA,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,SelectObject,DeleteDC,SelectObject,DeleteObject, | 0_2_02B24E30 |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | RDTSC instruction interceptor: First address: A66EDC second address: AF887F instructions: 0x00000000 rdtsc 0x00000002 call 00007F4C49043873h 0x00000007 pushfd 0x00000008 lea edx, dword ptr [78C71F60h+eax*2] 0x0000000f mov eax, dword ptr [ecx] 0x00000011 jmp 00007F4C48F45648h 0x00000016 mov edx, dword ptr [eax+0Ch] 0x00000019 pushfd 0x0000001a lea esp, dword ptr [esp+10h] 0x0000001e jc 00007F4C48F0DE2Ah 0x00000024 push E485F571h 0x00000029 call 00007F4C48FEC182h 0x0000002e mov dword ptr [esp+04h], 00A230FCh 0x00000036 pushad 0x00000037 mov dword ptr [esp+20h], edi 0x0000003b pushad 0x0000003c call 00007F4C48F7E765h 0x00000041 push edi 0x00000042 mov dword ptr [esp+44h], 00A5DA7Fh 0x0000004a pushfd 0x0000004b push dword ptr [esp] 0x0000004e mov dword ptr [esp+48h], edx 0x00000052 mov byte ptr [esp+08h], dh 0x00000056 mov word ptr [esp+08h], 1E69h 0x0000005d push dword ptr [esp+48h] 0x00000061 retn 004Ch 0x00000064 jmp 00007F4C49061538h 0x00000069 call 00007F4C48F4FFEAh 0x0000006e sub edx, 60FEF360h 0x00000074 sal dh, cl 0x00000076 rcr dh, 00000006h 0x00000079 mov dword ptr [esp], ebp 0x0000007c lahf 0x0000007d pushad 0x0000007e lea ebp, dword ptr [esp+20h] 0x00000082 sar dx, cl 0x00000085 sub esp, 000004B0h 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\hfrR6WOIt6.exe | RDTSC instruction interceptor: First address: A624C0 second address: A624C0 instructions: 0x00000000 rdtsc 0x00000002 aad B1h 0x00000004 bsr ax, si 0x00000008 lea eax, dword ptr [esi+ecx] 0x0000000b btc dx, 000Fh 0x00000010 cdq 0x00000011 call 00007F4C4902E31Bh 0x00000016 clc 0x00000017 cmc 0x00000018 pushfd 0x00000019 sub eax, edx 0x0000001b bsf dx, di 0x0000001f call 00007F4C48E4CECBh 0x00000024 sub dh, bl 0x00000026 clc 0x00000027 sar eax, 1 0x00000029 inc dl 0x0000002b adc dl, dh 0x0000002d stc 0x0000002e inc dx 0x00000031 movzx edx, word ptr [edi+eax*8+04h] 0x00000036 push CDC0282Eh 0x0000003b pushad 0x0000003c cmc 0x0000003d cmc 0x0000003e cmp dx, bx 0x00000041 call 00007F4C49001BF0h 0x00000046 mov word ptr [esp+04h], bp 0x0000004b mov byte ptr [esp+08h], cl 0x0000004f lea esp, dword ptr [esp+34h] 0x00000053 je 00007F4C48FB8D93h 0x00000059 push E19D80F8h 0x0000005e jmp 00007F4C48EC78F2h 0x00000063 call 00007F4C49023D5Ch 0x00000068 call 00007F4C48FAC5F1h 0x0000006d lea esp, dword ptr [esp+0Ch] 0x00000071 jbe 00007F4C48F34800h 0x00000077 ror ch, cl 0x00000079 lea ecx, dword ptr [eax+01h] 0x0000007c clc 0x0000007d bt edx, 0Eh 0x00000081 cmc 0x00000082 cmp ecx, esi 0x00000084 call 00007F4C48F12AA9h 0x00000089 pushfd 0x0000008a pushad 0x0000008b call 00007F4C48F38BB6h 0x00000090 lea esp, dword ptr [esp+2Ch] 0x00000094 jng 00007F4C48F6B506h 0x0000009a rdtsc |
Source: hfrR6WOIt6.exe, 00000000.00000002.2632430053.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000002.2633391536.00000000031D8000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1380286735.0000000002E70000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: GetProgmanWindow |
Source: hfrR6WOIt6.exe, 00000000.00000002.2632430053.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SetProgmanWindowK+ |
Source: hfrR6WOIt6.exe, 00000000.00000002.2632430053.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000002.2633391536.00000000031D8000.00000040.00000020.00020000.00000000.sdmp, hfrR6WOIt6.exe, 00000000.00000003.1380286735.0000000002E70000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SetProgmanWindow |