Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0 |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07 |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0 |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: http://ocsp.digicert.com0: |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: http://www.digicert.com/CPS0v |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/ |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/) |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/9 |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/; |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/B |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/C |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/K |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/M |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/P |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/S |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.bin |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.bin) |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.bin1 |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.bin3 |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.bin: |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binC |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binH |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binI |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binL |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binQ |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binR |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binWy |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.bina |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binf |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binj |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/813843419184365593/814034797084540958/uSBKpe156.binln |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/k |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/l |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/o |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842374649.00000000009B8000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/or? |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://cdn.discordapp.com/r |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842625264.0000000002500000.00000004.00000001.sdmp |
String found in binary or memory: https://www.cloudflare.com/5xx-error-landing |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842453796.0000000000A1F000.00000004.00000020.sdmp |
String found in binary or memory: https://www.digicert.com/CPS0 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005604D5 EnumWindows,NtSetInformationThread, |
21_2_005604D5 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562E99 NtSetInformationThread, |
21_2_00562E99 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005607DB NtProtectVirtualMemory, |
21_2_005607DB |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_0056104D NtProtectVirtualMemory, |
21_2_0056104D |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00561015 NtProtectVirtualMemory, |
21_2_00561015 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00561005 NtProtectVirtualMemory, |
21_2_00561005 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005610ED NtProtectVirtualMemory, |
21_2_005610ED |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00561099 NtProtectVirtualMemory, |
21_2_00561099 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00561089 NtProtectVirtualMemory, |
21_2_00561089 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005610AD NtProtectVirtualMemory, |
21_2_005610AD |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00568115 NtProtectVirtualMemory, |
21_2_00568115 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00567D59 NtProtectVirtualMemory, |
21_2_00567D59 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005605DD NtSetInformationThread, |
21_2_005605DD |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005605C7 NtSetInformationThread, |
21_2_005605C7 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005605F9 NtSetInformationThread, |
21_2_005605F9 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005605B1 NtSetInformationThread, |
21_2_005605B1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_0056064B NtSetInformationThread, |
21_2_0056064B |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00560665 NtSetInformationThread, |
21_2_00560665 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00560615 NtSetInformationThread, |
21_2_00560615 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005606C5 NtSetInformationThread, |
21_2_005606C5 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005606FD NtSetInformationThread, |
21_2_005606FD |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00560689 NtSetInformationThread, |
21_2_00560689 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005606AB NtSetInformationThread, |
21_2_005606AB |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00560713 NtSetInformationThread, |
21_2_00560713 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562FC0 NtSetInformationThread, |
21_2_00562FC0 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562FE3 NtSetInformationThread,LoadLibraryA, |
21_2_00562FE3 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00566795 NtSetInformationThread, |
21_2_00566795 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005607DB |
21_2_005607DB |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_0056127B |
21_2_0056127B |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005612D5 |
21_2_005612D5 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005612ED |
21_2_005612ED |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00561289 |
21_2_00561289 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005612A1 |
21_2_005612A1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00561311 |
21_2_00561311 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00564519 |
21_2_00564519 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005646B1 |
21_2_005646B1 |
Source: New_Shipment_order#345-4252.exe, 00000000.00000000.317901681.0000000000418000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameSkydningernes.exe vs New_Shipment_order#345-4252.exe |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.846298931.000000001DDB0000.00000002.00000001.sdmp |
Binary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs New_Shipment_order#345-4252.exe |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.846269173.000000001DC60000.00000002.00000001.sdmp |
Binary or memory string: OriginalFilenamemswsock.dll.muij% vs New_Shipment_order#345-4252.exe |
Source: New_Shipment_order#345-4252.exe, 00000015.00000000.589662948.0000000000418000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameSkydningernes.exe vs New_Shipment_order#345-4252.exe |
Source: New_Shipment_order#345-4252.exe |
Binary or memory string: OriginalFilenameSkydningernes.exe vs New_Shipment_order#345-4252.exe |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562BC6 |
21_2_00562BC6 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562BB3 |
21_2_00562BB3 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562BB1 LoadLibraryA, |
21_2_00562BB1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562C39 |
21_2_00562C39 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562C21 |
21_2_00562C21 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562C89 |
21_2_00562C89 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562CB9 |
21_2_00562CB9 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562CA1 |
21_2_00562CA1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000430121 second address: 0000000000434104 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov ebp, esp 0x0000000d call 00007F2AECC80C9Ah 0x00000012 pop dword ptr [ebp+44h] 0x00000015 jmp 00007F2AECC80C92h 0x00000017 test eax, ebx 0x00000019 push dword ptr [ebp+44h] 0x0000001c jmp 00007F2AECC80C92h 0x0000001e cmp cx, dx 0x00000021 call 00007F2AECC84BEFh 0x00000026 mov ebx, dword ptr [esp+04h] 0x0000002a inc ebx 0x0000002b dec ebx 0x0000002c xor edx, edx 0x0000002e jmp 00007F2AECC80C92h 0x00000030 pushad 0x00000031 lfence 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000434104 second address: 0000000000434104 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, ebx 0x0000000d mov ecx, 00001000h 0x00000012 jmp 00007F2AEC880122h 0x00000014 test ebx, 549F426Ch 0x0000001a div ecx 0x0000001c cmp edx, 00000000h 0x0000001f jne 00007F2AEC8800C8h 0x00000021 dec ebx 0x00000022 xor edx, edx 0x00000024 jmp 00007F2AEC880122h 0x00000026 pushad 0x00000027 lfence 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000430BC5 second address: 0000000000430D77 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp eax, 00000000h 0x0000000e je 00007F2AECC80DF7h 0x00000014 jmp 00007F2AECC80C92h 0x00000016 cmp edx, ecx 0x00000018 mov ecx, dword ptr [ebp+5Ch] 0x0000001b jmp 00007F2AECC80C92h 0x0000001d pushad 0x0000001e lfence 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000435BB1 second address: 0000000000435BB1 instructions: |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000560121 second address: 0000000000564104 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov ebp, esp 0x0000000d call 00007F2AECC80C9Ah 0x00000012 pop dword ptr [ebp+44h] 0x00000015 jmp 00007F2AECC80C92h 0x00000017 test eax, ebx 0x00000019 push dword ptr [ebp+44h] 0x0000001c jmp 00007F2AECC80C92h 0x0000001e cmp cx, dx 0x00000021 call 00007F2AECC84BEFh 0x00000026 mov ebx, dword ptr [esp+04h] 0x0000002a inc ebx 0x0000002b dec ebx 0x0000002c xor edx, edx 0x0000002e jmp 00007F2AECC80C92h 0x00000030 pushad 0x00000031 lfence 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000564104 second address: 0000000000564104 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, ebx 0x0000000d mov ecx, 00001000h 0x00000012 jmp 00007F2AEC880122h 0x00000014 test ebx, 549F426Ch 0x0000001a div ecx 0x0000001c cmp edx, 00000000h 0x0000001f jne 00007F2AEC8800C8h 0x00000021 dec ebx 0x00000022 xor edx, edx 0x00000024 jmp 00007F2AEC880122h 0x00000026 pushad 0x00000027 lfence 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000560BC5 second address: 0000000000560D77 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp eax, 00000000h 0x0000000e je 00007F2AECC80DF7h 0x00000014 jmp 00007F2AECC80C92h 0x00000016 cmp edx, ecx 0x00000018 mov ecx, dword ptr [ebp+5Ch] 0x0000001b jmp 00007F2AECC80C92h 0x0000001d pushad 0x0000001e lfence 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
RDTSC instruction interceptor: First address: 0000000000565DD7 second address: 0000000000565DD7 instructions: |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842430053.0000000000A07000.00000004.00000020.sdmp |
Binary or memory string: Hyper-V RAWo |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842374649.00000000009B8000.00000004.00000020.sdmp |
Binary or memory string: Hyper-V RAW |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842119436.0000000000560000.00000040.00000001.sdmp |
Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00564057 mov eax, dword ptr fs:[00000030h] |
21_2_00564057 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562859 mov eax, dword ptr fs:[00000030h] |
21_2_00562859 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_0056284A mov eax, dword ptr fs:[00000030h] |
21_2_0056284A |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562871 mov eax, dword ptr fs:[00000030h] |
21_2_00562871 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562829 mov eax, dword ptr fs:[00000030h] |
21_2_00562829 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005628B7 mov eax, dword ptr fs:[00000030h] |
21_2_005628B7 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005628A9 mov eax, dword ptr fs:[00000030h] |
21_2_005628A9 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562BC6 mov eax, dword ptr fs:[00000030h] |
21_2_00562BC6 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562BB3 mov eax, dword ptr fs:[00000030h] |
21_2_00562BB3 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562BB1 mov eax, dword ptr fs:[00000030h] |
21_2_00562BB1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_0056745D mov eax, dword ptr fs:[00000030h] |
21_2_0056745D |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_0056740D mov eax, dword ptr fs:[00000030h] |
21_2_0056740D |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562C39 mov eax, dword ptr fs:[00000030h] |
21_2_00562C39 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562C21 mov eax, dword ptr fs:[00000030h] |
21_2_00562C21 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005674C1 mov eax, dword ptr fs:[00000030h] |
21_2_005674C1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00567484 mov eax, dword ptr fs:[00000030h] |
21_2_00567484 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00562CA1 mov eax, dword ptr fs:[00000030h] |
21_2_00562CA1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005674A9 mov eax, dword ptr fs:[00000030h] |
21_2_005674A9 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_0056753B mov eax, dword ptr fs:[00000030h] |
21_2_0056753B |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_005666AB mov eax, dword ptr fs:[00000030h] |
21_2_005666AB |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00565FA1 mov eax, dword ptr fs:[00000030h] |
21_2_00565FA1 |
Source: C:\Users\user\Desktop\New_Shipment_order#345-4252.exe |
Code function: 21_2_00561FAE mov eax, dword ptr fs:[00000030h] |
21_2_00561FAE |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842508428.0000000000F40000.00000002.00000001.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842508428.0000000000F40000.00000002.00000001.sdmp |
Binary or memory string: Progman |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842508428.0000000000F40000.00000002.00000001.sdmp |
Binary or memory string: &Program Manager |
Source: New_Shipment_order#345-4252.exe, 00000015.00000002.842508428.0000000000F40000.00000002.00000001.sdmp |
Binary or memory string: Progmanlock |