Source: Payment_png.exe, 00000002.00000002.306035151.0000000000561000.00000040.00000001.sdmp | String found in binary or memory: http://aps-mm.com/bin_BNUtTDfY243.bin |
Source: explorer.exe, 00000006.00000000.294226634.000000000F740000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://fontfabrik.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.com/c8bs/www.bostonm.info |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.aainakari.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.com/c8bs/www.silverdollarcafe.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.accinf5.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.net/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.net/c8bs/www.choupisson.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.birkenhof-allgaeu.netReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.com/c8bs/www.pcpartout.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.booksfall.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.info |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.info/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.info/c8bs/www.quantify-co.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.bostonm.infoReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.com/c8bs/www.aainakari.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.broskiusa.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.com/c8bs/www.uforservice.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.choupisson.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.net/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.net/c8bs/www.accinf5.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domennyarendi39.netReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.net/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.net/c8bs/www.broskiusa.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.domentemenegi42.netReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.fonts.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.com/c8bs/www.booksfall.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.loversdeal.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.com/c8bs/www.birkenhof-allgaeu.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.pcpartout.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.com/c8bs/www.slutefuter.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.plowbrothers.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.com/c8bs/M |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.quantify-co.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.com/c8bs/www.domentemenegi42.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.silverdollarcafe.comReferer: |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.com/c8bs/www.loversdeal.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.slutefuter.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.tiro.com |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.typography.netD |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.com |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.com/c8bs/ |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.com/c8bs/www.domennyarendi39.net |
Source: explorer.exe, 00000006.00000002.481389502.0000000005603000.00000004.00000001.sdmp | String found in binary or memory: http://www.uforservice.comReferer: |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: explorer.exe, 00000006.00000000.290712760.0000000008B46000.00000002.00000001.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02220438 EnumWindows,NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02224EE8 NtProtectVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225331 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02220F83 NtWriteVirtualMemory,LoadLibraryA, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222992 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221E27 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_0222542F NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222033 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022220A1 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022204AF NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221AB4 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221E81 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022254F5 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022254CB NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022204D5 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221F21 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225338 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225301 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221369 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225544 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022253B4 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222183 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02225380 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221986 NtSetInformationThread,NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221F93 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221DEB NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022253EF NtMapViewOfSection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9660 NtAllocateVirtualMemory,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E96E0 NtFreeVirtualMemory,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9710 NtQueryInformationToken,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E97A0 NtUnmapViewOfSection,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9780 NtMapViewOfSection,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9FE0 NtCreateMutant,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9540 NtReadFile,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E95D0 NtClose,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A20 NtResumeThread,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A00 NtProtectVirtualMemory,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A50 NtCreateFile,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9860 NtQuerySystemInformation,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9840 NtDelayExecution,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E98F0 NtReadVirtualMemory,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9910 NtAdjustPrivilegesToken,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E99A0 NtCreateSection,LdrInitializeThunk, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9610 NtEnumerateValueKey, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9670 NtQueryInformationProcess, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9650 NtQueryValueKey, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E96D0 NtCreateKey, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9730 NtQueryVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EA710 NtOpenProcessToken, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EA770 NtOpenThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9770 NtSetInformationFile, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9760 NtOpenProcess, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EAD30 NtSetContextThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9520 NtWaitForSingleObject, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9560 NtWriteFile, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E95F0 NtQueryInformationFile, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A10 NtQuerySection, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9A80 NtOpenDirectoryObject, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9B00 NtSetValueKey, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EA3B0 NtGetContextThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9820 NtEnumerateKey, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3EB040 NtSuspendThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E98A0 NtWriteVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E9950 NtQueueApcThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E99D0 NtCreateProcessEx, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565331 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00564EE8 NtProtectVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565301 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565338 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005653EF NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565380 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005653B4 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_0056542F NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005654CB NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_005654F5 NtSetInformationThread, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00565544 NtSetInformationThread, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C495D0 NtClose,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49540 NtReadFile,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C496D0 NtCreateKey,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C496E0 NtFreeVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49650 NtQueryValueKey,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49660 NtAllocateVirtualMemory,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49FE0 NtCreateMutant,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49780 NtMapViewOfSection,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49710 NtQueryInformationToken,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49840 NtDelayExecution,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49860 NtQuerySystemInformation,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C499A0 NtCreateSection,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49910 NtAdjustPrivilegesToken,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A50 NtCreateFile,LdrInitializeThunk, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C495F0 NtQueryInformationFile, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49560 NtWriteFile, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49520 NtWaitForSingleObject, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4AD30 NtSetContextThread, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49670 NtQueryInformationProcess, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49610 NtEnumerateValueKey, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C497A0 NtUnmapViewOfSection, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49760 NtOpenProcess, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4A770 NtOpenThread, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49770 NtSetInformationFile, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4A710 NtOpenProcessToken, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49730 NtQueryVirtualMemory, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C498F0 NtReadVirtualMemory, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C498A0 NtWriteVirtualMemory, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4B040 NtSuspendThread, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49820 NtEnumerateKey, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C499D0 NtCreateProcessEx, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49950 NtQueueApcThread, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A80 NtOpenDirectoryObject, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A00 NtProtectVirtualMemory, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A10 NtQuerySection, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49A20 NtResumeThread, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C4A3B0 NtGetContextThread, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C49B00 NtSetValueKey, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_009681C0 NtCreateFile, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_009682F0 NtClose, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_00968270 NtReadFile, |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_009683A0 NtAllocateVirtualMemory, |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02222415 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02224B11 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221369 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02224377 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_022219A3 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02221986 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 0_2_02223BE9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AE44 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AE44 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AE620 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA61C mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA61C mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC600 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC600 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC600 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D8E00 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461608 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CAE73 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B766D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45FE3F mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B7E41 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45FEC0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478ED6 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43FE87 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B76E2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D16E0 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E470EA5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E470EA5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E470EA5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4246A7 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D36CC mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E8EC7 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB73D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB73D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DE730 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A4F2E mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A4F2E mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CF716 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478F6A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA70E mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA70E mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47070D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47070D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43FF10 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43FF10 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BFF60 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BEF40 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B8794 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E37F5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427794 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427794 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427794 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DBC2C mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43C450 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43C450 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E461C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DAC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47740D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47740D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E47740D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C746D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA44B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478CD6 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B849B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426CF0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426CF0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426CF0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4614FB mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E423540 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E453D40 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4D3B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4D3B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4D3B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AAD30 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B3D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CC577 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CC577 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C7D50 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478D34 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E42A537 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E3D43 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46E539 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D1DB5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D1DB5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D1DB5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E426DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D35A1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46FDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DFD9B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DFD9B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A2D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E458DF1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BD5E0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BD5E0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4705AC mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4705AC mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E4A2C mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E4A2C mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46EA55 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E434257 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA229 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C3A1C mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45B260 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45B260 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478A62 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A5210 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AAA16 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AAA16 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B8A0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E927A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AA16 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46AA16 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9240 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BAAB0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BAAB0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DFAB0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A52A5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DD294 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DD294 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E464AEF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2AE4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2ACB mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E478B58 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA309 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D3B7A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D3B7A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3ADB60 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46131B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AF358 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3ADB40 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4253CA mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4253CA mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4BAD mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4BAD mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D4BAD mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4523E3 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4523E3 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4523E3 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2397 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DB390 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B1B8F mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3B1B8F mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D138B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D138B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D138B mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E45D380 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E46138A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CDBE9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D03E2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E475BA5 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CA830 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D002D mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3BB02A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E471074 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E462073 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E474015 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E474015 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427016 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427016 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E427016 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C0050 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C0050 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DF0BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DF0BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DF0BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3E90AF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E43B8D0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D20A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9080 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E423884 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E423884 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A58EC mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB8E4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB8E4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A40E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A40E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A40E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D513A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D513A mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C4120 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9100 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9100 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3A9100 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB171 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB171 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AC962 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB944 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CB944 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov ecx, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3C99BF mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D61A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D61A0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4341E8 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3D2990 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3DA185 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3CC182 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB1E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB1E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E3AB1E1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4649A4 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4269A6 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_1E4251BE mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00564377 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00564B11 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00563BE9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Users\user\Desktop\Payment_png.exe | Code function: 2_2_00562410 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD8CD6 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC14FB mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86CF0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86CF0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86CF0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C1849B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC4496 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3A44B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C9C450 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C9C450 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2746D mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C2B477 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3AC7B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD740D mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD740D mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD740D mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86C0A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC1C06 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3BC2C mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov ecx, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C86DC9 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C1D5E0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C1D5E0 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CCFDE2 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CB8DF1 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C32581 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C02D8A mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CC2D82 mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3FD9B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C3FD9B mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD05AC mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04CD05AC mov eax, dword ptr fs:[00000030h] |
Source: C:\Windows\SysWOW64\colorcpl.exe | Code function: 14_2_04C335A1 mov eax, dword ptr fs:[00000030h] |