![]() ![]()
"DiskDrillProCrack-_PiratePC.Net_.exe" touched file "C:\Windows\Microsoft.NET\Framework\v9\Config\nfig" "DiskDrillProCrack-_PiratePC.Net_.exe" touched file "C:\Windows\Microsoft.NET\Framework\v9\clr.dll" "DiskDrillProCrack-_PiratePC.Net_.exe" touched file "C:\Windows\Microsoft.NET\Framework\v7\mscorwks.dll" "DiskDrillProCrack-_PiratePC.Net_.exe" touched file "C:\Windows\Microsoft.NET\Framework\v7\clr.dll" "DiskDrillProCrack-_PiratePC.Net_.exe" touched file "C:\Windows\Microsoft.NET\Framework\v\clr.dll" "DiskDrillProCrack-_PiratePC.Net_.exe" touched file "C:\Windows\Microsoft.NET\Framework\v\mscorwks.dll" "DiskDrillProCrack-_PiratePC.Net_.exe" touched file "%WINDIR%\Microsoft.NET\Framework\v\clr.dll" The input sample possibly contains the RDTSCP instruction "DiskDrillProCrack-_PiratePC.Net_.exe" touched "WBEM Locator" (Path: "HKCU\WOW6432NODE\CLSID\\TREATAS") utm_source=otx
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |