Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00DB50FA |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00D7D110 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00D7D110 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], C274D4CAh | 0_2_00DB63B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 53F09CFAh | 0_2_00DB99D0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 27BAF212h | 0_2_00DB695B |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp+04h] | 0_2_00D7FCA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [ebp-10h] | 0_2_00D80EEC |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then jmp ecx | 0_2_00DB6094 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], F3285E74h | 0_2_00DB4040 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov ecx, dword ptr [edx] | 0_2_00D71000 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then dec ebx | 0_2_00DAF030 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+20h] | 0_2_00D86F91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp+0Ch] | 0_2_00D9D1E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] | 0_2_00D842FC |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [eax], dx | 0_2_00D92260 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [esi], ax | 0_2_00D92260 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+30h] | 0_2_00DA23E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+30h] | 0_2_00DA23E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+30h] | 0_2_00DA23E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov byte ptr [edi], al | 0_2_00DA23E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+30h] | 0_2_00DA23E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+14h] | 0_2_00DA23E0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov ebp, eax | 0_2_00D7A300 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], C274D4CAh | 0_2_00DB64B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00D8D457 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx eax, word ptr [esi+ecx] | 0_2_00DB1440 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp+0Ch] | 0_2_00D9C470 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov dword ptr [esp], 00000000h | 0_2_00D8B410 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [ebp-14h] | 0_2_00D9E40C |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx ebx, byte ptr [ecx+esi+25h] | 0_2_00D78590 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00D99510 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] | 0_2_00D86536 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 7789B0CBh | 0_2_00DB7520 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 0_2_00DAB650 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [ebp-14h] | 0_2_00D9E66A |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp+08h] | 0_2_00DB67EF |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [ebp-14h] | 0_2_00D9D7AF |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx ecx, word ptr [edi+eax] | 0_2_00DB7710 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00DB5700 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [eax], dx | 0_2_00D928E9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx edx, byte ptr [esi+edi] | 0_2_00D749A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h | 0_2_00D8D961 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 62429966h | 0_2_00DB3920 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then jmp eax | 0_2_00D81ACD |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx edx, byte ptr [esi+ebx] | 0_2_00D75A50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], F3285E74h | 0_2_00DB4A40 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then jmp eax | 0_2_00D81A3C |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp+40h] | 0_2_00D81BEE |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+04h] | 0_2_00D83BE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 0_2_00DA0B80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp+000006B8h] | 0_2_00D8DB6F |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], F8FD61B8h | 0_2_00D8DB6F |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 53F09CFAh | 0_2_00DB9B60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], C85F7986h | 0_2_00D9CCD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00D9CCD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], C85F7986h | 0_2_00D9CCD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00DB9CE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 9ECF05EBh | 0_2_00DB9CE0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then jmp eax | 0_2_00D9AC91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [edx], ax | 0_2_00D9AC91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp word ptr [eax+esi+02h], 0000h | 0_2_00D9EC48 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h | 0_2_00D97C00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], A70A987Fh | 0_2_00DAFC20 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00DB8D8A |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov dword ptr [esp+1Ch], 5E46585Eh | 0_2_00D9FD10 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [ebp-14h] | 0_2_00D9DD29 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp+40h] | 0_2_00D81E93 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx ecx, word ptr [ebp+00h] | 0_2_00D7BEB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp byte ptr [ebx], 00000000h | 0_2_00D86EBF |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx edi, byte ptr [ecx+esi] | 0_2_00D76EA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then movzx ebx, word ptr [ecx] | 0_2_00D9AE57 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00D95E70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00D97E60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov edi, ecx | 0_2_00D84E2A |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then jmp ecx | 0_2_00D78FD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov word ptr [edx], 0000h | 0_2_00D8FFDF |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then jmp ecx | 0_2_00DB5FD6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], F3285E74h | 0_2_00DB7FC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00DB7FC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esi+20h] | 0_2_00D86F91 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 0_2_00DAFF70 |
Source: C:\Users\user\Desktop\file.exe | Code function: 4x nop then jmp eax | 0_2_00D99F62 |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: file.exe, 00000000.00000003.2114764855.000000000195E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115905068.000000000195E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://clearancek.site:443/apiQ |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/ |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Gu9gs5hf |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=M7aU |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6& |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1& |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0 |
Source: file.exe, 00000000.00000003.2114764855.000000000195E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115905068.000000000195E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dissapoiznw.store:443/api |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: file.exe, 00000000.00000003.2114764855.000000000195E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115905068.000000000195E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://licendfilteo.site:443/api( |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: file.exe, 00000000.00000003.2114764855.000000000195E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115905068.000000000195E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://spirittunek.store:443/api |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115993780.0000000001974000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: file.exe, 00000000.00000002.2115837874.0000000001947000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/: |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: file.exe, 00000000.00000003.2115028545.000000000197E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114764855.0000000001971000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2115028545.0000000001973000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115993780.000000000197E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115993780.0000000001974000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: file.exe, 00000000.00000003.2114764855.000000000195E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115905068.000000000195E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900 |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: file.exe, 00000000.00000003.2114990621.00000000019B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2116109509.00000000019B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: file.exe, 00000000.00000003.2114764855.000000000195E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2115905068.000000000195E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://studennotediw.store:443/api |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: file.exe, 00000000.00000003.2114764855.000000000194F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019F3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: file.exe, 00000000.00000003.2114709859.00000000019EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DD3A07 second address: DD3A0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3A808 second address: F3A80E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3A80E second address: F3A812 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3A98D second address: F3A995 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3A995 second address: F3A9A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007F2D346CD4E8h 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3A9A2 second address: F3A9A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3A9A7 second address: F3AA05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F2D346CD4F1h 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007F2D346CD4F8h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 ja 00007F2D346CD4E6h 0x0000001a jnc 00007F2D346CD4E6h 0x00000020 popad 0x00000021 pop edx 0x00000022 pop eax 0x00000023 pushad 0x00000024 jng 00007F2D346CD4F7h 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3ACDA second address: F3ACE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F2D34B8C6B6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3AE45 second address: F3AE4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E371 second address: F3E39C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 mov dword ptr [esp], eax 0x00000008 mov edi, dword ptr [ebp+122D2860h] 0x0000000e push 00000000h 0x00000010 mov di, 329Ah 0x00000014 call 00007F2D34B8C6B9h 0x00000019 push eax 0x0000001a push edx 0x0000001b jnp 00007F2D34B8C6BCh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E39C second address: F3E3E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F2D346CD4F4h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 jmp 00007F2D346CD4EDh 0x00000018 mov eax, dword ptr [eax] 0x0000001a push eax 0x0000001b push edx 0x0000001c push edx 0x0000001d push edi 0x0000001e pop edi 0x0000001f pop edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E3E7 second address: F3E3ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E3ED second address: F3E3F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E3F1 second address: F3E427 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 pushad 0x00000012 jns 00007F2D34B8C6B6h 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F2D34B8C6C9h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E427 second address: F3E4A8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop eax 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007F2D346CD4E8h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 0000001Ch 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 mov ch, B1h 0x00000024 push 00000003h 0x00000026 mov si, BD28h 0x0000002a push 00000000h 0x0000002c sub dword ptr [ebp+122D25DAh], eax 0x00000032 push 00000003h 0x00000034 xor dword ptr [ebp+122D1C53h], edx 0x0000003a push 474C1C00h 0x0000003f push ebx 0x00000040 jne 00007F2D346CD4E8h 0x00000046 pop ebx 0x00000047 add dword ptr [esp], 78B3E400h 0x0000004e xor dword ptr [ebp+122DB619h], esi 0x00000054 lea ebx, dword ptr [ebp+1243E287h] 0x0000005a mov edx, dword ptr [ebp+122D368Eh] 0x00000060 xchg eax, ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 pushad 0x00000064 jng 00007F2D346CD4E6h 0x0000006a jmp 00007F2D346CD4EAh 0x0000006f popad 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E52A second address: F3E530 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E530 second address: F3E54F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4F6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E54F second address: F3E612 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ebx 0x00000008 jns 00007F2D34B8C6B6h 0x0000000e pop ebx 0x0000000f popad 0x00000010 nop 0x00000011 jno 00007F2D34B8C6B9h 0x00000017 push 00000000h 0x00000019 xor edx, dword ptr [ebp+122D1F5Ah] 0x0000001f push 70A00381h 0x00000024 je 00007F2D34B8C6E4h 0x0000002a pushad 0x0000002b jmp 00007F2D34B8C6C7h 0x00000030 jmp 00007F2D34B8C6C5h 0x00000035 popad 0x00000036 xor dword ptr [esp], 70A00301h 0x0000003d jmp 00007F2D34B8C6C7h 0x00000042 push 00000003h 0x00000044 push 00000000h 0x00000046 push edi 0x00000047 call 00007F2D34B8C6B8h 0x0000004c pop edi 0x0000004d mov dword ptr [esp+04h], edi 0x00000051 add dword ptr [esp+04h], 0000001Ch 0x00000059 inc edi 0x0000005a push edi 0x0000005b ret 0x0000005c pop edi 0x0000005d ret 0x0000005e pushad 0x0000005f mov ebx, 72F15DD3h 0x00000064 mov dword ptr [ebp+122D1C06h], edi 0x0000006a popad 0x0000006b push 00000000h 0x0000006d mov esi, eax 0x0000006f push 00000003h 0x00000071 mov di, 9B58h 0x00000075 call 00007F2D34B8C6B9h 0x0000007a push eax 0x0000007b push eax 0x0000007c push eax 0x0000007d push edx 0x0000007e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E612 second address: F3E61F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E61F second address: F3E62A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F2D34B8C6B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E62A second address: F3E63A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E63A second address: F3E64F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D34B8C6C0h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E64F second address: F3E67A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jne 00007F2D346CD4EAh 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F2D346CD4F1h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E79F second address: F3E7E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F2D34B8C6BAh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b add dword ptr [esp], 06E65762h 0x00000012 pushad 0x00000013 mov ax, si 0x00000016 sbb ch, FFFFFFFCh 0x00000019 popad 0x0000001a push 00000003h 0x0000001c mov di, 01B0h 0x00000020 push 00000000h 0x00000022 mov ecx, dword ptr [ebp+122D1E0Fh] 0x00000028 push 00000003h 0x0000002a mov dx, ABCBh 0x0000002e call 00007F2D34B8C6B9h 0x00000033 push esi 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 pop eax 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E7E0 second address: F3E80A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b jmp 00007F2D346CD4EBh 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 jg 00007F2D346CD4E6h 0x0000001d pop edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3E80A second address: F3E814 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F2D34B8C6B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5CBC2 second address: F5CBC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5CBC6 second address: F5CBCD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5CEF4 second address: F5CEFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D07C second address: F5D080 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D080 second address: F5D090 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jo 00007F2D346CD4EEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D090 second address: F5D0B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F2D34B8C6C9h 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D0B7 second address: F5D0C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F2D346CD4E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D0C1 second address: F5D0C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D0C5 second address: F5D0CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D0CF second address: F5D0D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D0D5 second address: F5D0D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5D3C1 second address: F5D3D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 ja 00007F2D34B8C6B6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F51A1D second address: F51A8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F2D346CD4F5h 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007F2D346CD4F5h 0x00000016 jmp 00007F2D346CD4F9h 0x0000001b pushad 0x0000001c popad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F2D346CD4EAh 0x00000025 push ecx 0x00000026 pop ecx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5E53E second address: F5E564 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C7h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c js 00007F2D34B8C6B6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F5EB32 second address: F5EB5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007F2D346CD4EEh 0x0000000f jnl 00007F2D346CD4F2h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F60385 second address: F603A4 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2D34B8C6BEh 0x00000008 je 00007F2D34B8C6B8h 0x0000000e push edi 0x0000000f pop edi 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F603A4 second address: F603BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D346CD4F6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F603BE second address: F603CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6BCh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F64425 second address: F6442C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F64592 second address: F645A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F2D34B8C6B6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007F2D34B8C6B6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6C0A5 second address: F6C0C5 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2D346CD4E6h 0x00000008 jmp 00007F2D346CD4F3h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6C0C5 second address: F6C0D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D34B8C6BAh 0x00000009 pop edi 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6C0D7 second address: F6C0DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F51A0C second address: F51A1D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jns 00007F2D34B8C6B6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6B706 second address: F6B70E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6BDDF second address: F6BDE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6BDE3 second address: F6BDEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E775 second address: F6E779 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E779 second address: F6E7BF instructions: 0x00000000 rdtsc 0x00000002 js 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 1DA82042h 0x00000011 push 00000000h 0x00000013 push ecx 0x00000014 call 00007F2D346CD4E8h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], ecx 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc ecx 0x00000027 push ecx 0x00000028 ret 0x00000029 pop ecx 0x0000002a ret 0x0000002b mov dword ptr [ebp+122D1B16h], esi 0x00000031 call 00007F2D346CD4E9h 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E7BF second address: F6E7C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E7C3 second address: F6E7CD instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E7CD second address: F6E7FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F2D34B8C6C4h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 push eax 0x00000017 pop eax 0x00000018 pop esi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E7FC second address: F6E802 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E802 second address: F6E806 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E806 second address: F6E830 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a ja 00007F2D346CD4F2h 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 jc 00007F2D346CD4E6h 0x0000001d pop ecx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6EC82 second address: F6EC8C instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2D34B8C6BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6EE8D second address: F6EE93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6EE93 second address: F6EE98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F70616 second address: F70622 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F71772 second address: F7177C instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2D34B8C6BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F723BE second address: F723D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2D346CD4EEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F723D0 second address: F723D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F743E8 second address: F74470 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007F2D346CD4E8h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 0000001Ch 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 jmp 00007F2D346CD4F5h 0x00000029 push 00000000h 0x0000002b or dword ptr [ebp+122D2AB9h], edx 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push edx 0x00000036 call 00007F2D346CD4E8h 0x0000003b pop edx 0x0000003c mov dword ptr [esp+04h], edx 0x00000040 add dword ptr [esp+04h], 00000019h 0x00000048 inc edx 0x00000049 push edx 0x0000004a ret 0x0000004b pop edx 0x0000004c ret 0x0000004d mov dword ptr [ebp+122D2218h], esi 0x00000053 xchg eax, ebx 0x00000054 push ecx 0x00000055 js 00007F2D346CD4ECh 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F74470 second address: F7448B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 pushad 0x00000007 jg 00007F2D34B8C6B8h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F2D34B8C6BAh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F74F67 second address: F74F6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F74F6B second address: F74FC1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007F2D34B8C6B8h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 0000001Bh 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 cld 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push edi 0x0000002a mov esi, 0577297Ah 0x0000002f pop edi 0x00000030 xchg eax, ebx 0x00000031 push eax 0x00000032 push edx 0x00000033 push ebx 0x00000034 jmp 00007F2D34B8C6C8h 0x00000039 pop ebx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F74FC1 second address: F74FC6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F78AF5 second address: F78AF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F78AF9 second address: F78AFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F78AFF second address: F78B68 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6BAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b jg 00007F2D34B8C6B8h 0x00000011 pop eax 0x00000012 nop 0x00000013 sub edi, 46E1EC9Ah 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push esi 0x0000001e call 00007F2D34B8C6B8h 0x00000023 pop esi 0x00000024 mov dword ptr [esp+04h], esi 0x00000028 add dword ptr [esp+04h], 0000001Bh 0x00000030 inc esi 0x00000031 push esi 0x00000032 ret 0x00000033 pop esi 0x00000034 ret 0x00000035 push ebx 0x00000036 and edi, 1BCB1148h 0x0000003c pop ebx 0x0000003d push 00000000h 0x0000003f jmp 00007F2D34B8C6C4h 0x00000044 xchg eax, esi 0x00000045 push edi 0x00000046 push eax 0x00000047 push edx 0x00000048 push edi 0x00000049 pop edi 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7AB03 second address: F7AB6D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jl 00007F2D346CD4E6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e pushad 0x0000000f push esi 0x00000010 pop esi 0x00000011 jnl 00007F2D346CD4E6h 0x00000017 popad 0x00000018 pop eax 0x00000019 nop 0x0000001a xor edi, dword ptr [ebp+122D3836h] 0x00000020 push 00000000h 0x00000022 mov ebx, dword ptr [ebp+122D38DEh] 0x00000028 mov dword ptr [ebp+122D1B16h], esi 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push ebp 0x00000033 call 00007F2D346CD4E8h 0x00000038 pop ebp 0x00000039 mov dword ptr [esp+04h], ebp 0x0000003d add dword ptr [esp+04h], 00000018h 0x00000045 inc ebp 0x00000046 push ebp 0x00000047 ret 0x00000048 pop ebp 0x00000049 ret 0x0000004a pushad 0x0000004b mov ecx, dword ptr [ebp+122D26CFh] 0x00000051 cmc 0x00000052 popad 0x00000053 xchg eax, esi 0x00000054 push ecx 0x00000055 jns 00007F2D346CD4E8h 0x0000005b pop ecx 0x0000005c push eax 0x0000005d push eax 0x0000005e push edx 0x0000005f push edx 0x00000060 push eax 0x00000061 push edx 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7AB6D second address: F7AB72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F72AFA second address: F72B0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D346CD4EBh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7EE0B second address: F7EE1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D34B8C6BDh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7EE1D second address: F7EE32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F2D346CD4E6h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jno 00007F2D346CD4E6h 0x00000011 popad 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7F3E1 second address: F7F3E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7F3E5 second address: F7F3EF instructions: 0x00000000 rdtsc 0x00000002 jp 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F81399 second address: F8143D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F2D34B8C6B8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000016h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 call 00007F2D34B8C6C1h 0x0000002b jnl 00007F2D34B8C6C9h 0x00000031 pop ebx 0x00000032 jp 00007F2D34B8C6B7h 0x00000038 push 00000000h 0x0000003a mov di, bx 0x0000003d push 00000000h 0x0000003f push 00000000h 0x00000041 push esi 0x00000042 call 00007F2D34B8C6B8h 0x00000047 pop esi 0x00000048 mov dword ptr [esp+04h], esi 0x0000004c add dword ptr [esp+04h], 00000016h 0x00000054 inc esi 0x00000055 push esi 0x00000056 ret 0x00000057 pop esi 0x00000058 ret 0x00000059 stc 0x0000005a push eax 0x0000005b pushad 0x0000005c push edx 0x0000005d jp 00007F2D34B8C6B6h 0x00000063 pop edx 0x00000064 push eax 0x00000065 push edx 0x00000066 jc 00007F2D34B8C6B6h 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8143D second address: F81441 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F823A7 second address: F823AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8351E second address: F83522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F844CF second address: F84577 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jnl 00007F2D34B8C6B6h 0x00000011 jmp 00007F2D34B8C6BBh 0x00000016 popad 0x00000017 popad 0x00000018 push eax 0x00000019 jmp 00007F2D34B8C6C0h 0x0000001e nop 0x0000001f push 00000000h 0x00000021 push eax 0x00000022 call 00007F2D34B8C6B8h 0x00000027 pop eax 0x00000028 mov dword ptr [esp+04h], eax 0x0000002c add dword ptr [esp+04h], 00000017h 0x00000034 inc eax 0x00000035 push eax 0x00000036 ret 0x00000037 pop eax 0x00000038 ret 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push edx 0x0000003e call 00007F2D34B8C6B8h 0x00000043 pop edx 0x00000044 mov dword ptr [esp+04h], edx 0x00000048 add dword ptr [esp+04h], 0000001Ah 0x00000050 inc edx 0x00000051 push edx 0x00000052 ret 0x00000053 pop edx 0x00000054 ret 0x00000055 jnp 00007F2D34B8C6BCh 0x0000005b push 00000000h 0x0000005d push esi 0x0000005e adc bh, FFFFFFF8h 0x00000061 pop edi 0x00000062 xchg eax, esi 0x00000063 jp 00007F2D34B8C6BEh 0x00000069 push eax 0x0000006a jg 00007F2D34B8C6B6h 0x00000070 pop eax 0x00000071 push eax 0x00000072 push eax 0x00000073 push edx 0x00000074 jmp 00007F2D34B8C6C0h 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F85556 second address: F85576 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F2D346CD4F9h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F77D6D second address: F77D9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007F2D34B8C6C0h 0x0000000d pushad 0x0000000e jmp 00007F2D34B8C6C6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F87382 second address: F87388 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F87388 second address: F8739A instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8A52C second address: F8A532 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8DDEB second address: F8DDF0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8DDF0 second address: F8DDF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8DDF6 second address: F8DE12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007F2D34B8C6BEh 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8DE12 second address: F8DE18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7ACD6 second address: F7ACDC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8DE18 second address: F8DE1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7ACDC second address: F7ACE9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7ACE9 second address: F7ACF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F947CB second address: F947D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F93FB7 second address: F93FBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F93FBD second address: F93FC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F93FC9 second address: F94000 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jns 00007F2D346CD4F2h 0x0000000f pushad 0x00000010 jmp 00007F2D346CD4F0h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F94000 second address: F94008 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9415D second address: F94184 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007F2D346CD4F9h 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F94184 second address: F9418A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9432B second address: F94331 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F94331 second address: F9433B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F97F4C second address: F97F56 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F97F56 second address: F97FC8 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F2D34B8C6C5h 0x00000008 jmp 00007F2D34B8C6BFh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 jnc 00007F2D34B8C6C2h 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a pushad 0x0000001b pushad 0x0000001c push ebx 0x0000001d pop ebx 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 jnl 00007F2D34B8C6C1h 0x00000027 jmp 00007F2D34B8C6BBh 0x0000002c popad 0x0000002d mov eax, dword ptr [eax] 0x0000002f jo 00007F2D34B8C6C5h 0x00000035 jmp 00007F2D34B8C6BFh 0x0000003a mov dword ptr [esp+04h], eax 0x0000003e push eax 0x0000003f push edx 0x00000040 jne 00007F2D34B8C6BCh 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F98082 second address: F98094 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jp 00007F2D346CD4ECh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9DFFD second address: F9E005 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9E1AB second address: F9E1E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D346CD4F3h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f jmp 00007F2D346CD4F1h 0x00000014 push edi 0x00000015 pop edi 0x00000016 popad 0x00000017 popad 0x00000018 jnp 00007F2D346CD4F6h 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9E1E6 second address: F9E1EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9E632 second address: F9E63B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9E63B second address: F9E642 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F9E642 second address: F9E681 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2D346CD4F4h 0x00000008 je 00007F2D346CD4E6h 0x0000000e jns 00007F2D346CD4E6h 0x00000014 popad 0x00000015 pushad 0x00000016 push edi 0x00000017 pop edi 0x00000018 jmp 00007F2D346CD4F6h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA1E1F second address: FA1E2D instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA1E2D second address: FA1E33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA730A second address: FA731D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jl 00007F2D34B8C6B6h 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA731D second address: FA7345 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F2D346CD500h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 jmp 00007F2D346CD4F8h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA7345 second address: FA734B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA734B second address: FA734F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA734F second address: FA7359 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2D34B8C6B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D19E second address: F6D1A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D612 second address: DD3A07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d mov dl, 39h 0x0000000f push dword ptr [ebp+122D0505h] 0x00000015 mov ecx, dword ptr [ebp+122D3906h] 0x0000001b call dword ptr [ebp+122D282Eh] 0x00000021 pushad 0x00000022 mov dword ptr [ebp+122D22B0h], eax 0x00000028 mov dword ptr [ebp+122D25A7h], ecx 0x0000002e xor eax, eax 0x00000030 mov dword ptr [ebp+122D1E0Fh], edi 0x00000036 mov edx, dword ptr [esp+28h] 0x0000003a cmc 0x0000003b mov dword ptr [ebp+122D389Eh], eax 0x00000041 jmp 00007F2D34B8C6BAh 0x00000046 mov esi, 0000003Ch 0x0000004b mov dword ptr [ebp+122D1E0Fh], esi 0x00000051 jng 00007F2D34B8C6BCh 0x00000057 add esi, dword ptr [esp+24h] 0x0000005b jmp 00007F2D34B8C6C5h 0x00000060 lodsw 0x00000062 xor dword ptr [ebp+122D2337h], edx 0x00000068 add eax, dword ptr [esp+24h] 0x0000006c sub dword ptr [ebp+122D2337h], edx 0x00000072 mov ebx, dword ptr [esp+24h] 0x00000076 jnc 00007F2D34B8C6BCh 0x0000007c nop 0x0000007d jng 00007F2D34B8C6C9h 0x00000083 jmp 00007F2D34B8C6C3h 0x00000088 push eax 0x00000089 pushad 0x0000008a push ebx 0x0000008b jmp 00007F2D34B8C6BEh 0x00000090 pop ebx 0x00000091 push eax 0x00000092 push edx 0x00000093 push eax 0x00000094 push edx 0x00000095 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D6DB second address: F6D70F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jns 00007F2D346CD505h 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D70F second address: F6D715 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D715 second address: F6D71A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D898 second address: F6D8B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push ebx 0x00000007 jmp 00007F2D34B8C6BEh 0x0000000c pop ebx 0x0000000d xchg eax, esi 0x0000000e movzx ecx, dx 0x00000011 nop 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D8B8 second address: F6D8C6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6D8C6 second address: F6D8D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F2D34B8C6B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DA7D second address: F6DA83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DA83 second address: F6DA87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DF29 second address: F6DF39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007F2D346CD4E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DF39 second address: F6DF43 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DF43 second address: F6DF8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F2D346CD4F6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e call 00007F2D346CD4F1h 0x00000013 pushad 0x00000014 stc 0x00000015 sub cx, 8E91h 0x0000001a popad 0x0000001b pop edi 0x0000001c push 0000001Eh 0x0000001e mov edx, dword ptr [ebp+122D38A6h] 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DF8A second address: F6DF90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DF90 second address: F6DF95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7BE1D second address: F7BED2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 jmp 00007F2D34B8C6C9h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jg 00007F2D34B8C6D2h 0x00000014 nop 0x00000015 push 00000000h 0x00000017 push eax 0x00000018 call 00007F2D34B8C6B8h 0x0000001d pop eax 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 add dword ptr [esp+04h], 0000001Ch 0x0000002a inc eax 0x0000002b push eax 0x0000002c ret 0x0000002d pop eax 0x0000002e ret 0x0000002f push dword ptr fs:[00000000h] 0x00000036 jmp 00007F2D34B8C6C2h 0x0000003b mov di, dx 0x0000003e mov dword ptr fs:[00000000h], esp 0x00000045 sub dword ptr [ebp+1244FA89h], ecx 0x0000004b mov eax, dword ptr [ebp+122D0169h] 0x00000051 mov edi, dword ptr [ebp+122D21F4h] 0x00000057 push FFFFFFFFh 0x00000059 mov ebx, dword ptr [ebp+122D36EEh] 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 jc 00007F2D34B8C6BCh 0x00000068 je 00007F2D34B8C6B6h 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F7F590 second address: F7F594 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F80520 second address: F805B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6BAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c movzx edi, bx 0x0000000f push dword ptr fs:[00000000h] 0x00000016 mov dword ptr [ebp+122D1E0Fh], edi 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 mov edi, 063F97FBh 0x00000028 mov eax, dword ptr [ebp+122D07C9h] 0x0000002e push 00000000h 0x00000030 push ecx 0x00000031 call 00007F2D34B8C6B8h 0x00000036 pop ecx 0x00000037 mov dword ptr [esp+04h], ecx 0x0000003b add dword ptr [esp+04h], 00000014h 0x00000043 inc ecx 0x00000044 push ecx 0x00000045 ret 0x00000046 pop ecx 0x00000047 ret 0x00000048 mov edi, dword ptr [ebp+122D2674h] 0x0000004e push FFFFFFFFh 0x00000050 push 00000000h 0x00000052 push ebx 0x00000053 call 00007F2D34B8C6B8h 0x00000058 pop ebx 0x00000059 mov dword ptr [esp+04h], ebx 0x0000005d add dword ptr [esp+04h], 0000001Ah 0x00000065 inc ebx 0x00000066 push ebx 0x00000067 ret 0x00000068 pop ebx 0x00000069 ret 0x0000006a push edx 0x0000006b pop ebx 0x0000006c add edi, dword ptr [ebp+122D1EE8h] 0x00000072 nop 0x00000073 push eax 0x00000074 push edx 0x00000075 push esi 0x00000076 jmp 00007F2D34B8C6BCh 0x0000007b pop esi 0x0000007c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F85711 second address: F85717 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F865AD second address: F865B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8769C second address: F876A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F88633 second address: F88637 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F88637 second address: F88641 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F86680 second address: F86685 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F88641 second address: F8864B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F2D346CD4E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8864B second address: F8864F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F8874F second address: F88755 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F88755 second address: F8875B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E2A0 second address: F6E2A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E2A5 second address: F6E2B5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E354 second address: F6E35E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F2D346CD4E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6E35E second address: F6E362 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA65F0 second address: FA660D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D346CD4F7h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA660D second address: FA6616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA6616 second address: FA661A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA661A second address: FA6629 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6BBh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA68D8 second address: FA68E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2D346CD4EAh 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA68E8 second address: FA6900 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C4h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA6B9D second address: FA6BA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FA8A65 second address: FA8AA5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007F2D34B8C6B8h 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F2D34B8C6C7h 0x00000013 jmp 00007F2D34B8C6C9h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F2D087 second address: F2D08D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F2D08D second address: F2D093 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F24835 second address: F24839 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F24839 second address: F24863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D34B8C6C6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 pop ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 jne 00007F2D34B8C6B6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FAD407 second address: FAD411 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FAD411 second address: FAD417 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FAD417 second address: FAD439 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D346CD4F5h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F2D346CD4E6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FADE05 second address: FADE0F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FADE0F second address: FADE13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3FFA second address: FB3FFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3FFE second address: FB4015 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2D346CD4F1h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB4015 second address: FB4031 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F2D34B8C6C6h 0x00000008 jmp 00007F2D34B8C6BAh 0x0000000d jc 00007F2D34B8C6B6h 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB2A20 second address: FB2A26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB329D second address: FB32B8 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2D34B8C6BFh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB32B8 second address: FB32D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push edx 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3420 second address: FB3424 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB36AF second address: FB36B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB36B5 second address: FB36BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F2D34B8C6B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB36BF second address: FB36F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a jmp 00007F2D346CD4EEh 0x0000000f pop esi 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 pop edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB36F2 second address: FB36F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB36F6 second address: FB3714 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F2D346CD4E6h 0x00000008 jno 00007F2D346CD4E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jc 00007F2D346CD4EEh 0x00000016 jl 00007F2D346CD4E6h 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3714 second address: FB371C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB371C second address: FB3720 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3A00 second address: FB3A13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007F2D34B8C6B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d pushad 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3A13 second address: FB3A28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F2D346CD4E6h 0x0000000a jg 00007F2D346CD4E6h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3EB6 second address: FB3EBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3EBD second address: FB3EC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB3EC3 second address: FB3ED2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 jbe 00007F2D34B8C6B6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB274B second address: FB274F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FB274F second address: FB2755 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FBC5E0 second address: FBC5FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F2D346CD4F7h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FBC5FC second address: FBC61A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F2D34B8C6C4h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F30647 second address: F3064F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3064F second address: F3065C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jl 00007F2D34B8C6BCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F3065C second address: F30660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FBC033 second address: FBC03F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FBC31E second address: FBC342 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F2D346CD4F4h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FBE5EC second address: FBE619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnp 00007F2D34B8C6C2h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F2D34B8C6C2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FBE619 second address: FBE61D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC0232 second address: FC0239 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC3525 second address: FC3536 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2D346CD4EBh 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC37B9 second address: FC37D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2D34B8C6C5h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC37D4 second address: FC37D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC83A7 second address: FC83AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC879A second address: FC879F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC879F second address: FC87BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F2D34B8C6C6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC87BE second address: FC87C8 instructions: 0x00000000 rdtsc 0x00000002 js 00007F2D346CD4ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: F6DE01 second address: F6DE54 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b ja 00007F2D34B8C6D6h 0x00000011 call 00007F2D34B8C6C9h 0x00000016 sub dword ptr [ebp+122DB619h], esi 0x0000001c pop edx 0x0000001d add cx, 3B56h 0x00000022 push 00000004h 0x00000024 mov ecx, esi 0x00000026 nop 0x00000027 jnl 00007F2D34B8C6C2h 0x0000002d push eax 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC8B9C second address: FC8BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D346CD4F0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC8BB0 second address: FC8BB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC8BB4 second address: FC8BD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2D346CD4EFh 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007F2D346CD4E6h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC8BD3 second address: FC8C0A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6BBh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F2D34B8C6BFh 0x00000013 jmp 00007F2D34B8C6C4h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC8C0A second address: FC8C16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F2D346CD4E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FC8C16 second address: FC8C1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FCDB6C second address: FCDB7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F2D346CD4E6h 0x0000000a jns 00007F2D346CD4E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FCDE56 second address: FCDE60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FCDE60 second address: FCDE66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FCDE66 second address: FCDE74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jp 00007F2D34B8C6B6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FCE13A second address: FCE13E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD4C76 second address: FD4CB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jl 00007F2D34B8C6CFh 0x00000010 jmp 00007F2D34B8C6C3h 0x00000015 jne 00007F2D34B8C6B6h 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD4CB3 second address: FD4CB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD5CA0 second address: FD5CAE instructions: 0x00000000 rdtsc 0x00000002 jno 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD5CAE second address: FD5CB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD6520 second address: FD6524 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD6524 second address: FD653D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2D346CD4F0h 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDAA76 second address: FDAA92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F2D34B8C6B6h 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F2D34B8C6BBh 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDAA92 second address: FDAA96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDAA96 second address: FDAAA6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 jc 00007F2D34B8C6BCh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD9D85 second address: FD9D8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD9D8C second address: FD9DB5 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F2D34B8C6C3h 0x00000008 push edx 0x00000009 jmp 00007F2D34B8C6C1h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FD9F35 second address: FD9F3F instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2D346CD4E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA0B7 second address: FDA0BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA35C second address: FDA37A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jnp 00007F2D346CD4ECh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pushad 0x00000010 popad 0x00000011 jg 00007F2D346CD4E6h 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA660 second address: FDA666 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA666 second address: FDA66C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA7B2 second address: FDA7D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C2h 0x00000007 jne 00007F2D34B8C6B6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA7D4 second address: FDA7D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA7D8 second address: FDA7F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C1h 0x00000007 jmp 00007F2D34B8C6BAh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FDA7F7 second address: FDA7FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE6EC0 second address: FE6EE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007F2D34B8C6BEh 0x00000010 pushad 0x00000011 jnp 00007F2D34B8C6B6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE6EE1 second address: FE6EE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE6EE7 second address: FE6EEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE7463 second address: FE7478 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F2D346CD4E6h 0x0000000a popad 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jg 00007F2D346CD4E6h 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE7478 second address: FE747E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE747E second address: FE7496 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2D346CD4ECh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE7496 second address: FE74A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007F2D34B8C6B6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE74A9 second address: FE74AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE74AD second address: FE74C6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F2D34B8C6B6h 0x00000008 jmp 00007F2D34B8C6BCh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE74C6 second address: FE74D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jo 00007F2D346CD4ECh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE8C71 second address: FE8C75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FE6A73 second address: FE6A7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F2D346CD4E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FF03D5 second address: FF03E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F2D34B8C6B6h 0x0000000a jnp 00007F2D34B8C6B6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: FEFE10 second address: FEFE15 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1000282 second address: 1000286 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10003D2 second address: 10003D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10003D6 second address: 10003E6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 jng 00007F2D34B8C6BEh 0x0000000d push ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10026A8 second address: 10026CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4F1h 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b jmp 00007F2D346CD4EEh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1004CA1 second address: 1004CA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1004CA6 second address: 1004CAF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1004CAF second address: 1004CB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1011FF6 second address: 101201E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 je 00007F2D346CD4FEh 0x0000000d jmp 00007F2D346CD4F8h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101201E second address: 101202A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101380D second address: 1013811 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1013620 second address: 1013679 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F2D34B8C6C8h 0x0000000b popad 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F2D34B8C6C0h 0x00000014 jnl 00007F2D34B8C6D7h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A287 second address: 101A291 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F2D346CD4E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A291 second address: 101A2A5 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2D34B8C6B6h 0x00000008 jmp 00007F2D34B8C6BAh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A58D second address: 101A593 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A593 second address: 101A5E8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F2D34B8C6C6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F2D34B8C6BDh 0x00000011 jng 00007F2D34B8C6B6h 0x00000017 jmp 00007F2D34B8C6C8h 0x0000001c popad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 jp 00007F2D34B8C6B6h 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A5E8 second address: 101A5F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 ja 00007F2D346CD4E6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A5F7 second address: 101A603 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jl 00007F2D34B8C6B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A8D6 second address: 101A8DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101A8DA second address: 101A8E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101B34F second address: 101B355 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101B355 second address: 101B35B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101B35B second address: 101B360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101B360 second address: 101B377 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2D34B8C6C1h 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101B377 second address: 101B37B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101B37B second address: 101B3A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F2D34B8C6C5h 0x0000000f jbe 00007F2D34B8C6B6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101CE5A second address: 101CE5F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101CE5F second address: 101CE7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F2D34B8C6C8h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 101CE7E second address: 101CE84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10210F8 second address: 1021110 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007F2D34B8C6C8h 0x00000010 jo 00007F2D34B8C6C2h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1020CCC second address: 1020CD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1020CD2 second address: 1020CDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 102EEB8 second address: 102EED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2D346CD4EFh 0x00000009 popad 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jno 00007F2D346CD4E6h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 102EED8 second address: 102EEE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F2D34B8C6B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10331A8 second address: 10331BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D346CD4ECh 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 103F40D second address: 103F412 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 103F55F second address: 103F565 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10585D9 second address: 10585DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 1058B56 second address: 1058B60 instructions: 0x00000000 rdtsc 0x00000002 js 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105D562 second address: 105D5DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c add edx, 29889170h 0x00000012 mov dx, 5381h 0x00000016 push 00000004h 0x00000018 push 00000000h 0x0000001a push ebp 0x0000001b call 00007F2D34B8C6B8h 0x00000020 pop ebp 0x00000021 mov dword ptr [esp+04h], ebp 0x00000025 add dword ptr [esp+04h], 00000017h 0x0000002d inc ebp 0x0000002e push ebp 0x0000002f ret 0x00000030 pop ebp 0x00000031 ret 0x00000032 sbb edx, 12350AC6h 0x00000038 call 00007F2D34B8C6B9h 0x0000003d jmp 00007F2D34B8C6C0h 0x00000042 push eax 0x00000043 push edi 0x00000044 pushad 0x00000045 pushad 0x00000046 popad 0x00000047 push ecx 0x00000048 pop ecx 0x00000049 popad 0x0000004a pop edi 0x0000004b mov eax, dword ptr [esp+04h] 0x0000004f push ebx 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105D5DC second address: 105D5E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105D5E0 second address: 105D604 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F2D34B8C6B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b mov eax, dword ptr [eax] 0x0000000d jmp 00007F2D34B8C6BEh 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105D604 second address: 105D609 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105D609 second address: 105D60E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105D888 second address: 105D8D0 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F2D346CD4E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b mov dword ptr [esp], eax 0x0000000e mov dx, ax 0x00000011 jc 00007F2D346CD4E9h 0x00000017 push dword ptr [ebp+122D2838h] 0x0000001d pushad 0x0000001e mov bh, dh 0x00000020 mov dword ptr [ebp+12438234h], eax 0x00000026 popad 0x00000027 push 90837F76h 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F2D346CD4F5h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105D8D0 second address: 105D8D6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 105EB72 second address: 105EB82 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10608BA second address: 10608E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2D34B8C6BAh 0x00000009 jmp 00007F2D34B8C6C8h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 10608E0 second address: 10608FF instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2D346CD4E6h 0x00000008 jg 00007F2D346CD4E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jnp 00007F2D346CD4E6h 0x00000017 jc 00007F2D346CD4E6h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0B09 second address: 56C0B0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0B0D second address: 56C0B13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0B13 second address: 56C0B19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0B19 second address: 56C0B1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0B1D second address: 56C0B3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add eax, ecx 0x0000000a pushad 0x0000000b pushad 0x0000000c mov cx, 5745h 0x00000010 mov edi, eax 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 call 00007F2D34B8C6BCh 0x0000001a pop ecx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0B3F second address: 56C0BCF instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov eax, dword ptr [eax+00000860h] 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F2D346CD4F8h 0x00000015 and eax, 7600F538h 0x0000001b jmp 00007F2D346CD4EBh 0x00000020 popfd 0x00000021 pushfd 0x00000022 jmp 00007F2D346CD4F8h 0x00000027 and ah, FFFFFF98h 0x0000002a jmp 00007F2D346CD4EBh 0x0000002f popfd 0x00000030 popad 0x00000031 test eax, eax 0x00000033 jmp 00007F2D346CD4F6h 0x00000038 je 00007F2DA594368Bh 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007F2D346CD4ECh 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0BCF second address: 56C0C1B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2D34B8C6C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call 00007F2D34B8C6C2h 0x0000000e movzx ecx, dx 0x00000011 pop edi 0x00000012 popad 0x00000013 test byte ptr [eax+04h], 00000005h 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F2D34B8C6C9h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0C1B second address: 56C0C21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 56C0C21 second address: 56C0C25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |