Source: Payment_png.exe, 00000002.00000002.306035151.0000000000561000.00000040.00000001.sdmp | String found in binary or memory: http://aps-mm.com/bin_BNUtTDfY243.bin |
Source: explorer.exe, 00000006.00000000.294226634.000000000F740000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://fontfabrik.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.com/c8bs/www.bostonm.info |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.com/c8bs/www.silverdollarcafe.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.net/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.net/c8bs/www.choupisson.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.netReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.com/c8bs/www.pcpartout.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.info |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.info/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.info/c8bs/www.quantify-co.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.infoReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.com/c8bs/www.aainakari.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.com/c8bs/www.uforservice.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.net/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.net/c8bs/www.accinf5.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.netReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.net/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.net/c8bs/www.broskiusa.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.netReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fonts.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.com/c8bs/www.booksfall.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.com/c8bs/www.birkenhof-allgaeu.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.com/c8bs/www.slutefuter.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.com/c8bs/M |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.com/c8bs/www.domentemenegi42.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.com/c8bs/www.loversdeal.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.tiro.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.typography.netD |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.com/c8bs/www.domennyarendi39.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02220438 EnumWindows,NtSetInformationThread, | 0_2_02220438 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02224EE8 NtProtectVirtualMemory, | 0_2_02224EE8 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225331 NtMapViewOfSection, | 0_2_02225331 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02220F83 NtWriteVirtualMemory,LoadLibraryA, | 0_2_02220F83 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222992 NtSetInformationThread, | 0_2_02222992 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221E27 NtWriteVirtualMemory, | 0_2_02221E27 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_0222542F NtMapViewOfSection, | 0_2_0222542F |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222033 NtWriteVirtualMemory, | 0_2_02222033 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022220A1 NtWriteVirtualMemory, | 0_2_022220A1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022204AF NtSetInformationThread, | 0_2_022204AF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221AB4 NtWriteVirtualMemory, | 0_2_02221AB4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221E81 NtWriteVirtualMemory, | 0_2_02221E81 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022254F5 NtMapViewOfSection, | 0_2_022254F5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022254CB NtMapViewOfSection, | 0_2_022254CB |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022204D5 NtSetInformationThread, | 0_2_022204D5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221F21 NtWriteVirtualMemory, | 0_2_02221F21 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225338 NtMapViewOfSection, | 0_2_02225338 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225301 NtMapViewOfSection, | 0_2_02225301 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221369 NtWriteVirtualMemory, | 0_2_02221369 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225544 NtMapViewOfSection, | 0_2_02225544 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022253B4 NtMapViewOfSection, | 0_2_022253B4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222183 NtWriteVirtualMemory, | 0_2_02222183 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225380 NtMapViewOfSection, | 0_2_02225380 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221986 NtSetInformationThread,NtWriteVirtualMemory, | 0_2_02221986 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221F93 NtWriteVirtualMemory, | 0_2_02221F93 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221DEB NtWriteVirtualMemory, | 0_2_02221DEB |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022253EF NtMapViewOfSection, | 0_2_022253EF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9660 NtAllocateVirtualMemory,LdrInitializeThunk, | 2_2_1E3E9660 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E96E0 NtFreeVirtualMemory,LdrInitializeThunk, | 2_2_1E3E96E0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9710 NtQueryInformationToken,LdrInitializeThunk, | 2_2_1E3E9710 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E97A0 NtUnmapViewOfSection,LdrInitializeThunk, | 2_2_1E3E97A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9780 NtMapViewOfSection,LdrInitializeThunk, | 2_2_1E3E9780 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9FE0 NtCreateMutant,LdrInitializeThunk, | 2_2_1E3E9FE0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9540 NtReadFile,LdrInitializeThunk, | 2_2_1E3E9540 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E95D0 NtClose,LdrInitializeThunk, | 2_2_1E3E95D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A20 NtResumeThread,LdrInitializeThunk, | 2_2_1E3E9A20 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A00 NtProtectVirtualMemory,LdrInitializeThunk, | 2_2_1E3E9A00 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A50 NtCreateFile,LdrInitializeThunk, | 2_2_1E3E9A50 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9860 NtQuerySystemInformation,LdrInitializeThunk, | 2_2_1E3E9860 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9840 NtDelayExecution,LdrInitializeThunk, | 2_2_1E3E9840 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E98F0 NtReadVirtualMemory,LdrInitializeThunk, | 2_2_1E3E98F0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9910 NtAdjustPrivilegesToken,LdrInitializeThunk, | 2_2_1E3E9910 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E99A0 NtCreateSection,LdrInitializeThunk, | 2_2_1E3E99A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9610 NtEnumerateValueKey, | 2_2_1E3E9610 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9670 NtQueryInformationProcess, | 2_2_1E3E9670 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9650 NtQueryValueKey, | 2_2_1E3E9650 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E96D0 NtCreateKey, | 2_2_1E3E96D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9730 NtQueryVirtualMemory, | 2_2_1E3E9730 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EA710 NtOpenProcessToken, | 2_2_1E3EA710 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EA770 NtOpenThread, | 2_2_1E3EA770 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9770 NtSetInformationFile, | 2_2_1E3E9770 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9760 NtOpenProcess, | 2_2_1E3E9760 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EAD30 NtSetContextThread, | 2_2_1E3EAD30 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9520 NtWaitForSingleObject, | 2_2_1E3E9520 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9560 NtWriteFile, | 2_2_1E3E9560 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E95F0 NtQueryInformationFile, | 2_2_1E3E95F0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A10 NtQuerySection, | 2_2_1E3E9A10 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A80 NtOpenDirectoryObject, | 2_2_1E3E9A80 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9B00 NtSetValueKey, | 2_2_1E3E9B00 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EA3B0 NtGetContextThread, | 2_2_1E3EA3B0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9820 NtEnumerateKey, | 2_2_1E3E9820 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EB040 NtSuspendThread, | 2_2_1E3EB040 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E98A0 NtWriteVirtualMemory, | 2_2_1E3E98A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9950 NtQueueApcThread, | 2_2_1E3E9950 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E99D0 NtCreateProcessEx, | 2_2_1E3E99D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565331 NtSetInformationThread, | 2_2_00565331 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00564EE8 NtProtectVirtualMemory, | 2_2_00564EE8 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565301 NtSetInformationThread, | 2_2_00565301 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565338 NtSetInformationThread, | 2_2_00565338 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005653EF NtSetInformationThread, | 2_2_005653EF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565380 NtSetInformationThread, | 2_2_00565380 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005653B4 NtSetInformationThread, | 2_2_005653B4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_0056542F NtSetInformationThread, | 2_2_0056542F |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005654CB NtSetInformationThread, | 2_2_005654CB |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005654F5 NtSetInformationThread, | 2_2_005654F5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565544 NtSetInformationThread, | 2_2_00565544 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C495D0 NtClose,LdrInitializeThunk, | 14_2_04C495D0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49540 NtReadFile,LdrInitializeThunk, | 14_2_04C49540 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C496D0 NtCreateKey,LdrInitializeThunk, | 14_2_04C496D0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C496E0 NtFreeVirtualMemory,LdrInitializeThunk, | 14_2_04C496E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49650 NtQueryValueKey,LdrInitializeThunk, | 14_2_04C49650 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49660 NtAllocateVirtualMemory,LdrInitializeThunk, | 14_2_04C49660 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49FE0 NtCreateMutant,LdrInitializeThunk, | 14_2_04C49FE0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49780 NtMapViewOfSection,LdrInitializeThunk, | 14_2_04C49780 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49710 NtQueryInformationToken,LdrInitializeThunk, | 14_2_04C49710 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49840 NtDelayExecution,LdrInitializeThunk, | 14_2_04C49840 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49860 NtQuerySystemInformation,LdrInitializeThunk, | 14_2_04C49860 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C499A0 NtCreateSection,LdrInitializeThunk, | 14_2_04C499A0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49910 NtAdjustPrivilegesToken,LdrInitializeThunk, | 14_2_04C49910 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A50 NtCreateFile,LdrInitializeThunk, | 14_2_04C49A50 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C495F0 NtQueryInformationFile, | 14_2_04C495F0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49560 NtWriteFile, | 14_2_04C49560 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49520 NtWaitForSingleObject, | 14_2_04C49520 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4AD30 NtSetContextThread, | 14_2_04C4AD30 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49670 NtQueryInformationProcess, | 14_2_04C49670 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49610 NtEnumerateValueKey, | 14_2_04C49610 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C497A0 NtUnmapViewOfSection, | 14_2_04C497A0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49760 NtOpenProcess, | 14_2_04C49760 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4A770 NtOpenThread, | 14_2_04C4A770 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49770 NtSetInformationFile, | 14_2_04C49770 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4A710 NtOpenProcessToken, | 14_2_04C4A710 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49730 NtQueryVirtualMemory, | 14_2_04C49730 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C498F0 NtReadVirtualMemory, | 14_2_04C498F0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C498A0 NtWriteVirtualMemory, | 14_2_04C498A0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4B040 NtSuspendThread, | 14_2_04C4B040 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49820 NtEnumerateKey, | 14_2_04C49820 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C499D0 NtCreateProcessEx, | 14_2_04C499D0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49950 NtQueueApcThread, | 14_2_04C49950 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A80 NtOpenDirectoryObject, | 14_2_04C49A80 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A00 NtProtectVirtualMemory, | 14_2_04C49A00 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A10 NtQuerySection, | 14_2_04C49A10 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A20 NtResumeThread, | 14_2_04C49A20 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4A3B0 NtGetContextThread, | 14_2_04C4A3B0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49B00 NtSetValueKey, | 14_2_04C49B00 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_009681C0 NtCreateFile, | 14_2_009681C0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_009682F0 NtClose, | 14_2_009682F0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_00968270 NtReadFile, | 14_2_00968270 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_009683A0 NtAllocateVirtualMemory, | 14_2_009683A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222415 mov eax, dword ptr fs:[00000030h] | 0_2_02222415 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02224B11 mov eax, dword ptr fs:[00000030h] | 0_2_02224B11 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221369 mov eax, dword ptr fs:[00000030h] | 0_2_02221369 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02224377 mov eax, dword ptr fs:[00000030h] | 0_2_02224377 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022219A3 mov eax, dword ptr fs:[00000030h] | 0_2_022219A3 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221986 mov eax, dword ptr fs:[00000030h] | 0_2_02221986 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02223BE9 mov eax, dword ptr fs:[00000030h] | 0_2_02223BE9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AE44 mov eax, dword ptr fs:[00000030h] | 2_2_1E46AE44 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AE44 mov eax, dword ptr fs:[00000030h] | 2_2_1E46AE44 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AE620 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AE620 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA61C mov eax, dword ptr fs:[00000030h] | 2_2_1E3DA61C |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA61C mov eax, dword ptr fs:[00000030h] | 2_2_1E3DA61C |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC600 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AC600 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC600 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AC600 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC600 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AC600 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D8E00 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D8E00 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461608 mov eax, dword ptr fs:[00000030h] | 2_2_1E461608 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CAE73 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CAE73 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CAE73 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CAE73 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CAE73 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B766D mov eax, dword ptr fs:[00000030h] | 2_2_1E3B766D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45FE3F mov eax, dword ptr fs:[00000030h] | 2_2_1E45FE3F |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B7E41 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B7E41 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B7E41 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B7E41 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B7E41 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B7E41 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45FEC0 mov eax, dword ptr fs:[00000030h] | 2_2_1E45FEC0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478ED6 mov eax, dword ptr fs:[00000030h] | 2_2_1E478ED6 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43FE87 mov eax, dword ptr fs:[00000030h] | 2_2_1E43FE87 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B76E2 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B76E2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D16E0 mov ecx, dword ptr fs:[00000030h] | 2_2_1E3D16E0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E470EA5 mov eax, dword ptr fs:[00000030h] | 2_2_1E470EA5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E470EA5 mov eax, dword ptr fs:[00000030h] | 2_2_1E470EA5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E470EA5 mov eax, dword ptr fs:[00000030h] | 2_2_1E470EA5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4246A7 mov eax, dword ptr fs:[00000030h] | 2_2_1E4246A7 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D36CC mov eax, dword ptr fs:[00000030h] | 2_2_1E3D36CC |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E8EC7 mov eax, dword ptr fs:[00000030h] | 2_2_1E3E8EC7 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB73D mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB73D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB73D mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB73D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DE730 mov eax, dword ptr fs:[00000030h] | 2_2_1E3DE730 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A4F2E mov eax, dword ptr fs:[00000030h] | 2_2_1E3A4F2E |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A4F2E mov eax, dword ptr fs:[00000030h] | 2_2_1E3A4F2E |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CF716 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CF716 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478F6A mov eax, dword ptr fs:[00000030h] | 2_2_1E478F6A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA70E mov eax, dword ptr fs:[00000030h] | 2_2_1E3DA70E |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA70E mov eax, dword ptr fs:[00000030h] | 2_2_1E3DA70E |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47070D mov eax, dword ptr fs:[00000030h] | 2_2_1E47070D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47070D mov eax, dword ptr fs:[00000030h] | 2_2_1E47070D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43FF10 mov eax, dword ptr fs:[00000030h] | 2_2_1E43FF10 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43FF10 mov eax, dword ptr fs:[00000030h] | 2_2_1E43FF10 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BFF60 mov eax, dword ptr fs:[00000030h] | 2_2_1E3BFF60 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BEF40 mov eax, dword ptr fs:[00000030h] | 2_2_1E3BEF40 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B8794 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B8794 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E37F5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3E37F5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427794 mov eax, dword ptr fs:[00000030h] | 2_2_1E427794 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427794 mov eax, dword ptr fs:[00000030h] | 2_2_1E427794 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427794 mov eax, dword ptr fs:[00000030h] | 2_2_1E427794 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DBC2C mov eax, dword ptr fs:[00000030h] | 2_2_1E3DBC2C |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43C450 mov eax, dword ptr fs:[00000030h] | 2_2_1E43C450 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43C450 mov eax, dword ptr fs:[00000030h] | 2_2_1E43C450 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] | 2_2_1E461C06 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DAC7B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] | 2_2_1E426C0A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] | 2_2_1E426C0A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] | 2_2_1E426C0A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] | 2_2_1E426C0A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47740D mov eax, dword ptr fs:[00000030h] | 2_2_1E47740D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47740D mov eax, dword ptr fs:[00000030h] | 2_2_1E47740D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47740D mov eax, dword ptr fs:[00000030h] | 2_2_1E47740D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB477 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C746D mov eax, dword ptr fs:[00000030h] | 2_2_1E3C746D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA44B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DA44B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478CD6 mov eax, dword ptr fs:[00000030h] | 2_2_1E478CD6 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B849B mov eax, dword ptr fs:[00000030h] | 2_2_1E3B849B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426CF0 mov eax, dword ptr fs:[00000030h] | 2_2_1E426CF0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426CF0 mov eax, dword ptr fs:[00000030h] | 2_2_1E426CF0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426CF0 mov eax, dword ptr fs:[00000030h] | 2_2_1E426CF0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4614FB mov eax, dword ptr fs:[00000030h] | 2_2_1E4614FB |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] | 2_2_1E464496 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E423540 mov eax, dword ptr fs:[00000030h] | 2_2_1E423540 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E453D40 mov eax, dword ptr fs:[00000030h] | 2_2_1E453D40 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4D3B mov eax, dword ptr fs:[00000030h] | 2_2_1E3D4D3B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4D3B mov eax, dword ptr fs:[00000030h] | 2_2_1E3D4D3B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4D3B mov eax, dword ptr fs:[00000030h] | 2_2_1E3D4D3B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AAD30 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AAD30 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E3B3D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CC577 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CC577 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CC577 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CC577 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C7D50 mov eax, dword ptr fs:[00000030h] | 2_2_1E3C7D50 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478D34 mov eax, dword ptr fs:[00000030h] | 2_2_1E478D34 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E42A537 mov eax, dword ptr fs:[00000030h] | 2_2_1E42A537 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E3D43 mov eax, dword ptr fs:[00000030h] | 2_2_1E3E3D43 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46E539 mov eax, dword ptr fs:[00000030h] | 2_2_1E46E539 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D1DB5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D1DB5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D1DB5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D1DB5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D1DB5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D1DB5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] | 2_2_1E426DC9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] | 2_2_1E426DC9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] | 2_2_1E426DC9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov ecx, dword ptr fs:[00000030h] | 2_2_1E426DC9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] | 2_2_1E426DC9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] | 2_2_1E426DC9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D35A1 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D35A1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_1E46FDE2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_1E46FDE2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_1E46FDE2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_1E46FDE2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DFD9B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DFD9B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DFD9B mov eax, dword ptr fs:[00000030h] | 2_2_1E3DFD9B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] | 2_2_1E3A2D8A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] | 2_2_1E3A2D8A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] | 2_2_1E3A2D8A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] | 2_2_1E3A2D8A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] | 2_2_1E3A2D8A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E458DF1 mov eax, dword ptr fs:[00000030h] | 2_2_1E458DF1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2581 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2581 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2581 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2581 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] | 2_2_1E462D82 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] | 2_2_1E462D82 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] | 2_2_1E462D82 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] | 2_2_1E462D82 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] | 2_2_1E462D82 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] | 2_2_1E462D82 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] | 2_2_1E462D82 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BD5E0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3BD5E0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BD5E0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3BD5E0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4705AC mov eax, dword ptr fs:[00000030h] | 2_2_1E4705AC |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4705AC mov eax, dword ptr fs:[00000030h] | 2_2_1E4705AC |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E4A2C mov eax, dword ptr fs:[00000030h] | 2_2_1E3E4A2C |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E4A2C mov eax, dword ptr fs:[00000030h] | 2_2_1E3E4A2C |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46EA55 mov eax, dword ptr fs:[00000030h] | 2_2_1E46EA55 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E434257 mov eax, dword ptr fs:[00000030h] | 2_2_1E434257 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA229 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C3A1C mov eax, dword ptr fs:[00000030h] | 2_2_1E3C3A1C |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45B260 mov eax, dword ptr fs:[00000030h] | 2_2_1E45B260 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45B260 mov eax, dword ptr fs:[00000030h] | 2_2_1E45B260 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478A62 mov eax, dword ptr fs:[00000030h] | 2_2_1E478A62 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A5210 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov ecx, dword ptr fs:[00000030h] | 2_2_1E3A5210 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A5210 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A5210 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AAA16 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AAA16 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AAA16 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AAA16 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B8A0A mov eax, dword ptr fs:[00000030h] | 2_2_1E3B8A0A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E927A mov eax, dword ptr fs:[00000030h] | 2_2_1E3E927A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AA16 mov eax, dword ptr fs:[00000030h] | 2_2_1E46AA16 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AA16 mov eax, dword ptr fs:[00000030h] | 2_2_1E46AA16 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9240 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9240 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9240 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9240 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BAAB0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3BAAB0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BAAB0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3BAAB0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DFAB0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3DFAB0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A52A5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A52A5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A52A5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A52A5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A52A5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DD294 mov eax, dword ptr fs:[00000030h] | 2_2_1E3DD294 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DD294 mov eax, dword ptr fs:[00000030h] | 2_2_1E3DD294 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] | 2_2_1E464AEF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2AE4 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2AE4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2ACB mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2ACB |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478B58 mov eax, dword ptr fs:[00000030h] | 2_2_1E478B58 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA309 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D3B7A mov eax, dword ptr fs:[00000030h] | 2_2_1E3D3B7A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D3B7A mov eax, dword ptr fs:[00000030h] | 2_2_1E3D3B7A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3ADB60 mov ecx, dword ptr fs:[00000030h] | 2_2_1E3ADB60 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46131B mov eax, dword ptr fs:[00000030h] | 2_2_1E46131B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AF358 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AF358 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3ADB40 mov eax, dword ptr fs:[00000030h] | 2_2_1E3ADB40 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4253CA mov eax, dword ptr fs:[00000030h] | 2_2_1E4253CA |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4253CA mov eax, dword ptr fs:[00000030h] | 2_2_1E4253CA |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4BAD mov eax, dword ptr fs:[00000030h] | 2_2_1E3D4BAD |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4BAD mov eax, dword ptr fs:[00000030h] | 2_2_1E3D4BAD |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4BAD mov eax, dword ptr fs:[00000030h] | 2_2_1E3D4BAD |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4523E3 mov ecx, dword ptr fs:[00000030h] | 2_2_1E4523E3 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4523E3 mov ecx, dword ptr fs:[00000030h] | 2_2_1E4523E3 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4523E3 mov eax, dword ptr fs:[00000030h] | 2_2_1E4523E3 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2397 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2397 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DB390 mov eax, dword ptr fs:[00000030h] | 2_2_1E3DB390 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B1B8F mov eax, dword ptr fs:[00000030h] | 2_2_1E3B1B8F |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B1B8F mov eax, dword ptr fs:[00000030h] | 2_2_1E3B1B8F |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D138B mov eax, dword ptr fs:[00000030h] | 2_2_1E3D138B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D138B mov eax, dword ptr fs:[00000030h] | 2_2_1E3D138B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D138B mov eax, dword ptr fs:[00000030h] | 2_2_1E3D138B |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45D380 mov ecx, dword ptr fs:[00000030h] | 2_2_1E45D380 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46138A mov eax, dword ptr fs:[00000030h] | 2_2_1E46138A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CDBE9 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CDBE9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D03E2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D03E2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D03E2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D03E2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D03E2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D03E2 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E475BA5 mov eax, dword ptr fs:[00000030h] | 2_2_1E475BA5 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA830 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA830 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA830 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CA830 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] | 2_2_1E3D002D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] | 2_2_1E3D002D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] | 2_2_1E3D002D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] | 2_2_1E3D002D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] | 2_2_1E3D002D |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] | 2_2_1E3BB02A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] | 2_2_1E3BB02A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] | 2_2_1E3BB02A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] | 2_2_1E3BB02A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E471074 mov eax, dword ptr fs:[00000030h] | 2_2_1E471074 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462073 mov eax, dword ptr fs:[00000030h] | 2_2_1E462073 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E474015 mov eax, dword ptr fs:[00000030h] | 2_2_1E474015 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E474015 mov eax, dword ptr fs:[00000030h] | 2_2_1E474015 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427016 mov eax, dword ptr fs:[00000030h] | 2_2_1E427016 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427016 mov eax, dword ptr fs:[00000030h] | 2_2_1E427016 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427016 mov eax, dword ptr fs:[00000030h] | 2_2_1E427016 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C0050 mov eax, dword ptr fs:[00000030h] | 2_2_1E3C0050 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C0050 mov eax, dword ptr fs:[00000030h] | 2_2_1E3C0050 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DF0BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3DF0BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DF0BF mov eax, dword ptr fs:[00000030h] | 2_2_1E3DF0BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DF0BF mov eax, dword ptr fs:[00000030h] | 2_2_1E3DF0BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E90AF mov eax, dword ptr fs:[00000030h] | 2_2_1E3E90AF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_1E43B8D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov ecx, dword ptr fs:[00000030h] | 2_2_1E43B8D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_1E43B8D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_1E43B8D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_1E43B8D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_1E43B8D0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D20A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D20A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D20A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D20A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D20A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D20A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9080 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9080 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E423884 mov eax, dword ptr fs:[00000030h] | 2_2_1E423884 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E423884 mov eax, dword ptr fs:[00000030h] | 2_2_1E423884 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A58EC mov eax, dword ptr fs:[00000030h] | 2_2_1E3A58EC |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB8E4 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB8E4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB8E4 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB8E4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A40E1 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A40E1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A40E1 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A40E1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A40E1 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A40E1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D513A mov eax, dword ptr fs:[00000030h] | 2_2_1E3D513A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D513A mov eax, dword ptr fs:[00000030h] | 2_2_1E3D513A |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] | 2_2_1E3C4120 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] | 2_2_1E3C4120 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] | 2_2_1E3C4120 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] | 2_2_1E3C4120 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C4120 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9100 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9100 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9100 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9100 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9100 mov eax, dword ptr fs:[00000030h] | 2_2_1E3A9100 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB171 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AB171 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB171 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AB171 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC962 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AC962 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB944 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB944 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB944 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CB944 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] | 2_2_1E3C99BF |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D61A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D61A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D61A0 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D61A0 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4341E8 mov eax, dword ptr fs:[00000030h] | 2_2_1E4341E8 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2990 mov eax, dword ptr fs:[00000030h] | 2_2_1E3D2990 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA185 mov eax, dword ptr fs:[00000030h] | 2_2_1E3DA185 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CC182 mov eax, dword ptr fs:[00000030h] | 2_2_1E3CC182 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB1E1 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AB1E1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB1E1 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AB1E1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB1E1 mov eax, dword ptr fs:[00000030h] | 2_2_1E3AB1E1 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] | 2_2_1E4649A4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] | 2_2_1E4649A4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] | 2_2_1E4649A4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] | 2_2_1E4649A4 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4269A6 mov eax, dword ptr fs:[00000030h] | 2_2_1E4269A6 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] | 2_2_1E4251BE |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] | 2_2_1E4251BE |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] | 2_2_1E4251BE |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] | 2_2_1E4251BE |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00564377 mov eax, dword ptr fs:[00000030h] | 2_2_00564377 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00564B11 mov eax, dword ptr fs:[00000030h] | 2_2_00564B11 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00563BE9 mov eax, dword ptr fs:[00000030h] | 2_2_00563BE9 |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00562410 mov eax, dword ptr fs:[00000030h] | 2_2_00562410 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD8CD6 mov eax, dword ptr fs:[00000030h] | 14_2_04CD8CD6 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC14FB mov eax, dword ptr fs:[00000030h] | 14_2_04CC14FB |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86CF0 mov eax, dword ptr fs:[00000030h] | 14_2_04C86CF0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86CF0 mov eax, dword ptr fs:[00000030h] | 14_2_04C86CF0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86CF0 mov eax, dword ptr fs:[00000030h] | 14_2_04C86CF0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C1849B mov eax, dword ptr fs:[00000030h] | 14_2_04C1849B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] | 14_2_04CC4496 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3A44B mov eax, dword ptr fs:[00000030h] | 14_2_04C3A44B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C9C450 mov eax, dword ptr fs:[00000030h] | 14_2_04C9C450 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C9C450 mov eax, dword ptr fs:[00000030h] | 14_2_04C9C450 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2746D mov eax, dword ptr fs:[00000030h] | 14_2_04C2746D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] | 14_2_04C2B477 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] | 14_2_04C3AC7B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD740D mov eax, dword ptr fs:[00000030h] | 14_2_04CD740D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD740D mov eax, dword ptr fs:[00000030h] | 14_2_04CD740D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD740D mov eax, dword ptr fs:[00000030h] | 14_2_04CD740D |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] | 14_2_04C86C0A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] | 14_2_04C86C0A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] | 14_2_04C86C0A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] | 14_2_04C86C0A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] | 14_2_04CC1C06 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3BC2C mov eax, dword ptr fs:[00000030h] | 14_2_04C3BC2C |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] | 14_2_04C86DC9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] | 14_2_04C86DC9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] | 14_2_04C86DC9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov ecx, dword ptr fs:[00000030h] | 14_2_04C86DC9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] | 14_2_04C86DC9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] | 14_2_04C86DC9 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C1D5E0 mov eax, dword ptr fs:[00000030h] | 14_2_04C1D5E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C1D5E0 mov eax, dword ptr fs:[00000030h] | 14_2_04C1D5E0 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] | 14_2_04CCFDE2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] | 14_2_04CCFDE2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] | 14_2_04CCFDE2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] | 14_2_04CCFDE2 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CB8DF1 mov eax, dword ptr fs:[00000030h] | 14_2_04CB8DF1 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] | 14_2_04C32581 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] | 14_2_04C32581 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] | 14_2_04C32581 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] | 14_2_04C32581 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] | 14_2_04C02D8A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] | 14_2_04C02D8A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] | 14_2_04C02D8A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] | 14_2_04C02D8A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] | 14_2_04C02D8A |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] | 14_2_04CC2D82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] | 14_2_04CC2D82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] | 14_2_04CC2D82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] | 14_2_04CC2D82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] | 14_2_04CC2D82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] | 14_2_04CC2D82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] | 14_2_04CC2D82 |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3FD9B mov eax, dword ptr fs:[00000030h] | 14_2_04C3FD9B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3FD9B mov eax, dword ptr fs:[00000030h] | 14_2_04C3FD9B |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD05AC mov eax, dword ptr fs:[00000030h] | 14_2_04CD05AC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD05AC mov eax, dword ptr fs:[00000030h] | 14_2_04CD05AC |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C335A1 mov eax, dword ptr fs:[00000030h] | 14_2_04C335A1 |