Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C8850 | 0_2_008C8850 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093C090 | 0_2_0093C090 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00948093 | 0_2_00948093 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C20BD | 0_2_009C20BD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BE0B6 | 0_2_009BE0B6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A06091 | 0_2_00A06091 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095E0A9 | 0_2_0095E0A9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009520D4 | 0_2_009520D4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099C0DD | 0_2_0099C0DD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093E0C7 | 0_2_0093E0C7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A20CE | 0_2_009A20CE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D60C8 | 0_2_009D60C8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009360E0 | 0_2_009360E0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099800B | 0_2_0099800B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099200A | 0_2_0099200A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00968000 | 0_2_00968000 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D2001 | 0_2_009D2001 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A8A036 | 0_2_00A8A036 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B2029 | 0_2_009B2029 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EC05C | 0_2_009EC05C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092C040 | 0_2_0092C040 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0A078 | 0_2_00A0A078 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00920071 | 0_2_00920071 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FA077 | 0_2_009FA077 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F2071 | 0_2_009F2071 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00996197 | 0_2_00996197 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C0193 | 0_2_009C0193 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E4189 | 0_2_009E4189 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00934189 | 0_2_00934189 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092618F | 0_2_0092618F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E2190 | 0_2_008E2190 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B81BE | 0_2_009B81BE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009661D5 | 0_2_009661D5 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E41C0 | 0_2_008E41C0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009721CF | 0_2_009721CF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0E1F9 | 0_2_00A0E1F9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009861FF | 0_2_009861FF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DA1EA | 0_2_009DA1EA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A941DE | 0_2_00A941DE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FC1E2 | 0_2_009FC1E2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092A133 | 0_2_0092A133 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A413C | 0_2_009A413C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094A15F | 0_2_0094A15F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00954145 | 0_2_00954145 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092E144 | 0_2_0092E144 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C6280 | 0_2_008C6280 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0C2AE | 0_2_00A0C2AE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095E29A | 0_2_0095E29A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CC285 | 0_2_009CC285 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097828B | 0_2_0097828B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008DE290 | 0_2_008DE290 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D82B0 | 0_2_009D82B0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093C2AB | 0_2_0093C2AB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094E2AF | 0_2_0094E2AF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009762AA | 0_2_009762AA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E22DB | 0_2_009E22DB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A102F8 | 0_2_00A102F8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C82C7 | 0_2_009C82C7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009962C7 | 0_2_009962C7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F22F3 | 0_2_009F22F3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FA2E5 | 0_2_009FA2E5 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009922E4 | 0_2_009922E4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095021C | 0_2_0095021C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092420B | 0_2_0092420B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094C222 | 0_2_0094C222 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AE220 | 0_2_009AE220 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00962229 | 0_2_00962229 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C4252 | 0_2_009C4252 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E0251 | 0_2_009E0251 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099E279 | 0_2_0099E279 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D027C | 0_2_009D027C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008D6263 | 0_2_008D6263 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AA274 | 0_2_009AA274 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E4380 | 0_2_008E4380 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093039C | 0_2_0093039C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00936388 | 0_2_00936388 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C63BA | 0_2_009C63BA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009883DB | 0_2_009883DB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009863DC | 0_2_009863DC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009843C0 | 0_2_009843C0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009283F7 | 0_2_009283F7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008EC3FC | 0_2_008EC3FC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098E3EC | 0_2_0098E3EC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E830D | 0_2_008E830D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EA30A | 0_2_009EA30A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093430E | 0_2_0093430E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A8E336 | 0_2_00A8E336 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095630B | 0_2_0095630B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C4320 | 0_2_008C4320 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008EA33F | 0_2_008EA33F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098C329 | 0_2_0098C329 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C8330 | 0_2_008C8330 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097E35E | 0_2_0097E35E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00982356 | 0_2_00982356 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AC340 | 0_2_009AC340 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FE376 | 0_2_009FE376 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C448B | 0_2_009C448B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098A481 | 0_2_0098A481 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095A4B8 | 0_2_0095A4B8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A04B7 | 0_2_009A04B7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095C4AA | 0_2_0095C4AA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009584C3 | 0_2_009584C3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094C4CC | 0_2_0094C4CC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EE4FA | 0_2_009EE4FA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D64EB | 0_2_009D64EB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099E415 | 0_2_0099E415 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CA436 | 0_2_009CA436 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D2422 | 0_2_009D2422 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BE45C | 0_2_009BE45C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A88462 | 0_2_00A88462 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00932458 | 0_2_00932458 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00956447 | 0_2_00956447 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A7E44E | 0_2_00A7E44E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096847D | 0_2_0096847D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BA590 | 0_2_009BA590 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A85B8 | 0_2_009A85B8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EC5B2 | 0_2_009EC5B2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009225BF | 0_2_009225BF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0C59C | 0_2_00A0C59C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009625D7 | 0_2_009625D7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F05D0 | 0_2_009F05D0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C05FD | 0_2_009C05FD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B45F5 | 0_2_009B45F5 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096A5E3 | 0_2_0096A5E3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E05E8 | 0_2_009E05E8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00948514 | 0_2_00948514 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0A532 | 0_2_00A0A532 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00952506 | 0_2_00952506 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D0504 | 0_2_009D0504 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E2510 | 0_2_008E2510 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A652B | 0_2_009A652B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00940555 | 0_2_00940555 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E455D | 0_2_009E455D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094A54A | 0_2_0094A54A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00970563 | 0_2_00970563 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A0692 | 0_2_009A0692 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A668C | 0_2_009A668C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097E6A0 | 0_2_0097E6A0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092C6D7 | 0_2_0092C6D7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E86C0 | 0_2_008E86C0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E66D0 | 0_2_008E66D0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097A6F1 | 0_2_0097A6F1 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F26F7 | 0_2_009F26F7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D06F6 | 0_2_009D06F6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A106CE | 0_2_00A106CE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00998616 | 0_2_00998616 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00966600 | 0_2_00966600 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098860F | 0_2_0098860F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097660B | 0_2_0097660B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00934633 | 0_2_00934633 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EA63D | 0_2_009EA63D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FA633 | 0_2_009FA633 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E8631 | 0_2_009E8631 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093A651 | 0_2_0093A651 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00978651 | 0_2_00978651 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A4653 | 0_2_009A4653 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C2642 | 0_2_009C2642 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092A677 | 0_2_0092A677 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00992670 | 0_2_00992670 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008CA780 | 0_2_008CA780 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DC792 | 0_2_009DC792 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00996782 | 0_2_00996782 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CC782 | 0_2_009CC782 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008D8792 | 0_2_008D8792 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009247BC | 0_2_009247BC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008DE7C0 | 0_2_008DE7C0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009507DA | 0_2_009507DA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BE7E8 | 0_2_009BE7E8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009887E2 | 0_2_009887E2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00926710 | 0_2_00926710 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C6710 | 0_2_008C6710 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D8728 | 0_2_009D8728 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00974729 | 0_2_00974729 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00938748 | 0_2_00938748 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098C77E | 0_2_0098C77E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DE76E | 0_2_009DE76E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D689B | 0_2_009D689B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099E88C | 0_2_0099E88C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096288D | 0_2_0096288D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F88B3 | 0_2_009F88B3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008CC8B6 | 0_2_008CC8B6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009588AE | 0_2_009588AE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E88CB | 0_2_008E88CB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A008E9 | 0_2_00A008E9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A28CC | 0_2_009A28CC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009228F5 | 0_2_009228F5 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C08FB | 0_2_009C08FB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F48F6 | 0_2_009F48F6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C680C | 0_2_009C680C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C480E | 0_2_009C480E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00986800 | 0_2_00986800 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008F8810 | 0_2_008F8810 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008D682D | 0_2_008D682D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FE838 | 0_2_009FE838 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093C83C | 0_2_0093C83C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00932854 | 0_2_00932854 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099A852 | 0_2_0099A852 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A10874 | 0_2_00A10874 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A8873 | 0_2_009A8873 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A929ED | 0_2_00A929ED |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A69CF | 0_2_009A69CF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DA9C4 | 0_2_009DA9C4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094C9F4 | 0_2_0094C9F4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A749CC | 0_2_00A749CC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A869DD | 0_2_00A869DD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A029D9 | 0_2_00A029D9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FC907 | 0_2_009FC907 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D292C | 0_2_009D292C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EC928 | 0_2_009EC928 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E0939 | 0_2_008E0939 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B892C | 0_2_009B892C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008F0940 | 0_2_008F0940 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098A97C | 0_2_0098A97C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092C97D | 0_2_0092C97D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E8A8C | 0_2_009E8A8C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009ECA88 | 0_2_009ECA88 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00924A8F | 0_2_00924A8F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D8ABD | 0_2_009D8ABD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00966AB3 | 0_2_00966AB3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00964ABB | 0_2_00964ABB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00928ABD | 0_2_00928ABD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00974AAE | 0_2_00974AAE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00934AAF | 0_2_00934AAF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00936AAD | 0_2_00936AAD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095AAD6 | 0_2_0095AAD6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096AAD9 | 0_2_0096AAD9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00982AFE | 0_2_00982AFE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00938AE3 | 0_2_00938AE3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099CAE0 | 0_2_0099CAE0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B2AE2 | 0_2_009B2AE2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00998AE3 | 0_2_00998AE3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CCAE7 | 0_2_009CCAE7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00948A16 | 0_2_00948A16 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A06A23 | 0_2_00A06A23 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F0A1A | 0_2_009F0A1A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092EA1A | 0_2_0092EA1A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CEA10 | 0_2_009CEA10 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D4A11 | 0_2_009D4A11 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C8A07 | 0_2_009C8A07 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008CEA10 | 0_2_008CEA10 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094AA09 | 0_2_0094AA09 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00946A3D | 0_2_00946A3D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FCA36 | 0_2_009FCA36 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0CA0A | 0_2_00A0CA0A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F2A58 | 0_2_009F2A58 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E2A57 | 0_2_009E2A57 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EAA41 | 0_2_009EAA41 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00976A7E | 0_2_00976A7E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00922A7E | 0_2_00922A7E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BAA75 | 0_2_009BAA75 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A4A65 | 0_2_009A4A65 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C2B9C | 0_2_009C2B9C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00954B9F | 0_2_00954B9F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A04BBC | 0_2_00A04BBC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095EBA0 | 0_2_0095EBA0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00926BA9 | 0_2_00926BA9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DCBD8 | 0_2_009DCBD8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097ABD8 | 0_2_0097ABD8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FEBCA | 0_2_009FEBCA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00990BC0 | 0_2_00990BC0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C4BFB | 0_2_009C4BFB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00958BE7 | 0_2_00958BE7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00956BEF | 0_2_00956BEF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008F6B08 | 0_2_008F6B08 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B6B1C | 0_2_009B6B1C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FAB18 | 0_2_009FAB18 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00996B3B | 0_2_00996B3B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096EB2B | 0_2_0096EB2B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0EB7B | 0_2_00A0EB7B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E6B50 | 0_2_008E6B50 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A0B70 | 0_2_009A0B70 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00994B74 | 0_2_00994B74 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008EAC90 | 0_2_008EAC90 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A90CB6 | 0_2_00A90CB6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008FECA0 | 0_2_008FECA0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00960CA9 | 0_2_00960CA9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008CACF0 | 0_2_008CACF0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098EC1A | 0_2_0098EC1A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F4C1B | 0_2_009F4C1B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00932C0D | 0_2_00932C0D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093CC3D | 0_2_0093CC3D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00972C39 | 0_2_00972C39 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092EC29 | 0_2_0092EC29 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00940C5B | 0_2_00940C5B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00984C71 | 0_2_00984C71 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C4C60 | 0_2_008C4C60 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F8C6E | 0_2_009F8C6E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00934C67 | 0_2_00934C67 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00928C68 | 0_2_00928C68 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A08C5A | 0_2_00A08C5A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098CC66 | 0_2_0098CC66 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B8D99 | 0_2_009B8D99 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096CD9B | 0_2_0096CD9B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00920D84 | 0_2_00920D84 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A2D80 | 0_2_009A2D80 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097CD8C | 0_2_0097CD8C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DADD8 | 0_2_009DADD8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092EDD4 | 0_2_0092EDD4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00980DDE | 0_2_00980DDE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098AD11 | 0_2_0098AD11 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A06D65 | 0_2_00A06D65 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008CCD46 | 0_2_008CCD46 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092CD46 | 0_2_0092CD46 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00968D42 | 0_2_00968D42 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00952D63 | 0_2_00952D63 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E0D60 | 0_2_009E0D60 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0CEA1 | 0_2_00A0CEA1 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00924E9B | 0_2_00924E9B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00988E8A | 0_2_00988E8A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094EE82 | 0_2_0094EE82 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099CEB0 | 0_2_0099CEB0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00978EBA | 0_2_00978EBA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00948ED2 | 0_2_00948ED2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BAEDD | 0_2_009BAEDD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C2ED4 | 0_2_009C2ED4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008FAEC0 | 0_2_008FAEC0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00964EC3 | 0_2_00964EC3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00920EC4 | 0_2_00920EC4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095CEC2 | 0_2_0095CEC2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096AECC | 0_2_0096AECC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00976EF9 | 0_2_00976EF9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C6EE9 | 0_2_009C6EE9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096CEE0 | 0_2_0096CEE0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00982EE2 | 0_2_00982EE2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00926EE9 | 0_2_00926EE9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EAEE5 | 0_2_009EAEE5 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B0EE5 | 0_2_009B0EE5 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00970E10 | 0_2_00970E10 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093EE05 | 0_2_0093EE05 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008DCE29 | 0_2_008DCE29 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C8E58 | 0_2_009C8E58 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DEE58 | 0_2_009DEE58 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00950E46 | 0_2_00950E46 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009ECE41 | 0_2_009ECE41 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00936E73 | 0_2_00936E73 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E2E74 | 0_2_009E2E74 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008F6E74 | 0_2_008F6E74 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D4E63 | 0_2_009D4E63 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AEF9B | 0_2_009AEF9B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00966F98 | 0_2_00966F98 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BCF8F | 0_2_009BCF8F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A84FBF | 0_2_00A84FBF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00958F8B | 0_2_00958F8B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00928FAA | 0_2_00928FAA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008FEFB0 | 0_2_008FEFB0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00926FDB | 0_2_00926FDB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093AFD9 | 0_2_0093AFD9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A00FEF | 0_2_00A00FEF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AAFC8 | 0_2_009AAFC8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097AFCA | 0_2_0097AFCA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096EFFF | 0_2_0096EFFF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00938FFE | 0_2_00938FFE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00990FF6 | 0_2_00990FF6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C2FEF | 0_2_009C2FEF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DCF1D | 0_2_009DCF1D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0EF22 | 0_2_00A0EF22 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092AF11 | 0_2_0092AF11 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00996F12 | 0_2_00996F12 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00946F0C | 0_2_00946F0C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00922F0B | 0_2_00922F0B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009ACF04 | 0_2_009ACF04 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E4F54 | 0_2_009E4F54 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00944F59 | 0_2_00944F59 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008F8F59 | 0_2_008F8F59 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C2F50 | 0_2_008C2F50 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D0F43 | 0_2_009D0F43 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E0F50 | 0_2_008E0F50 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B4F6D | 0_2_009B4F6D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008ECF74 | 0_2_008ECF74 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099709F | 0_2_0099709F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095509B | 0_2_0095509B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B308E | 0_2_009B308E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A70DB | 0_2_009A70DB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FF0FA | 0_2_009FF0FA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A8F0C7 | 0_2_00A8F0C7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098D0E3 | 0_2_0098D0E3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BF005 | 0_2_009BF005 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00995038 | 0_2_00995038 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00969038 | 0_2_00969038 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00935021 | 0_2_00935021 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00925027 | 0_2_00925027 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A102C | 0_2_009A102C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00985059 | 0_2_00985059 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00943059 | 0_2_00943059 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A09078 | 0_2_00A09078 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F307D | 0_2_009F307D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F9071 | 0_2_009F9071 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D906C | 0_2_009D906C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F91B0 | 0_2_009F91B0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097F1AC | 0_2_0097F1AC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C91B0 | 0_2_008C91B0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C71A2 | 0_2_009C71A2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F11DD | 0_2_009F11DD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E31C2 | 0_2_008E31C2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009631C6 | 0_2_009631C6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E91DD | 0_2_008E91DD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AB1CE | 0_2_009AB1CE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A91CC | 0_2_009A91CC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008FB1D0 | 0_2_008FB1D0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009511E3 | 0_2_009511E3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E11E9 | 0_2_009E11E9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099F11B | 0_2_0099F11B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096113D | 0_2_0096113D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00929129 | 0_2_00929129 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098B125 | 0_2_0098B125 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A03167 | 0_2_00A03167 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C117E | 0_2_009C117E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092B168 | 0_2_0092B168 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F5163 | 0_2_009F5163 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099D291 | 0_2_0099D291 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DB297 | 0_2_009DB297 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00939281 | 0_2_00939281 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00967282 | 0_2_00967282 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009F12B6 | 0_2_009F12B6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093D2B8 | 0_2_0093D2B8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009312A8 | 0_2_009312A8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E52DD | 0_2_008E52DD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A012F8 | 0_2_00A012F8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008DB2E0 | 0_2_008DB2E0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094B217 | 0_2_0094B217 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CB203 | 0_2_009CB203 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008D5220 | 0_2_008D5220 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096B24F | 0_2_0096B24F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0527E | 0_2_00A0527E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098126D | 0_2_0098126D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CF264 | 0_2_009CF264 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094D26B | 0_2_0094D26B |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095F397 | 0_2_0095F397 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00947380 | 0_2_00947380 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009353A4 | 0_2_009353A4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00B09388 | 0_2_00B09388 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EB3C7 | 0_2_009EB3C7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C93C2 | 0_2_009C93C2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009213E8 | 0_2_009213E8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E5327 | 0_2_008E5327 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008FF330 | 0_2_008FF330 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E535E | 0_2_009E535E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008FD34D | 0_2_008FD34D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095B34F | 0_2_0095B34F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096F372 | 0_2_0096F372 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0094536E | 0_2_0094536E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008D148F | 0_2_008D148F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00933491 | 0_2_00933491 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FB48D | 0_2_009FB48D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A1483 | 0_2_009A1483 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009614B7 | 0_2_009614B7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C14A7 | 0_2_009C14A7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E34A1 | 0_2_009E34A1 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C54DE | 0_2_009C54DE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009894C8 | 0_2_009894C8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E91DD | 0_2_008E91DD |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E94F2 | 0_2_009E94F2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008C74F0 | 0_2_008C74F0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0D429 | 0_2_00A0D429 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C3417 | 0_2_009C3417 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009C7403 | 0_2_009C7403 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009E742E | 0_2_009E742E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0B41E | 0_2_00A0B41E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009ED45E | 0_2_009ED45E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009B3457 | 0_2_009B3457 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097F47A | 0_2_0097F47A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098D475 | 0_2_0098D475 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0099546E | 0_2_0099546E |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008D759F | 0_2_008D759F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093B585 | 0_2_0093B585 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A35B1 | 0_2_009A35B1 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0F58F | 0_2_00A0F58F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CF5DF | 0_2_009CF5DF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AF5D5 | 0_2_009AF5D5 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009BF5C6 | 0_2_009BF5C6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009CB5FC | 0_2_009CB5FC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D75F1 | 0_2_009D75F1 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A75F7 | 0_2_009A75F7 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AB5EB | 0_2_009AB5EB |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009715E3 | 0_2_009715E3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0093F5EE | 0_2_0093F5EE |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D551A | 0_2_009D551A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A83526 | 0_2_00A83526 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008F7500 | 0_2_008F7500 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00969534 | 0_2_00969534 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009FF539 | 0_2_009FF539 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0095753C | 0_2_0095753C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00973557 | 0_2_00973557 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098F54D | 0_2_0098F54D |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009DB575 | 0_2_009DB575 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0092756A | 0_2_0092756A |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00951694 | 0_2_00951694 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0098369C | 0_2_0098369C |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0096369F | 0_2_0096369F |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_0097F6B3 | 0_2_0097F6B3 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009D16A6 | 0_2_009D16A6 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00A0D6E4 | 0_2_00A0D6E4 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009EB6CF | 0_2_009EB6CF |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009AF6CC | 0_2_009AF6CC |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009456CA | 0_2_009456CA |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009796C9 | 0_2_009796C9 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009776F0 | 0_2_009776F0 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_008E36E2 | 0_2_008E36E2 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_009A96E8 | 0_2_009A96E8 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | Code function: 0_2_00993612 | 0_2_00993612 |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9D457 second address: A9D45E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9C527 second address: A9C554 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jne 00007FBE58BB0BB6h 0x00000010 pop ebx 0x00000011 jp 00007FBE58BB0BC2h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9C6E3 second address: A9C6E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9C6E7 second address: A9C6ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9EFFC second address: A9F002 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9F002 second address: A9F006 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9F118 second address: A9F1B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C13852h 0x00000009 popad 0x0000000a push ebx 0x0000000b jmp 00007FBE58C1384Ah 0x00000010 pop ebx 0x00000011 popad 0x00000012 nop 0x00000013 adc si, 0A0Eh 0x00000018 push 00000000h 0x0000001a xor dx, D263h 0x0000001f push 733A9B80h 0x00000024 push esi 0x00000025 jmp 00007FBE58C13856h 0x0000002a pop esi 0x0000002b xor dword ptr [esp], 733A9B00h 0x00000032 call 00007FBE58C1384Dh 0x00000037 mov dword ptr [ebp+122D1AA8h], edx 0x0000003d pop esi 0x0000003e push 00000003h 0x00000040 pushad 0x00000041 movsx ecx, ax 0x00000044 jne 00007FBE58C1384Bh 0x0000004a popad 0x0000004b push 00000000h 0x0000004d ja 00007FBE58C1384Bh 0x00000053 push 00000003h 0x00000055 mov dx, C310h 0x00000059 call 00007FBE58C13849h 0x0000005e push eax 0x0000005f push edx 0x00000060 push eax 0x00000061 push edx 0x00000062 js 00007FBE58C13846h 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9F1B9 second address: A9F1BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9F1BF second address: A9F1DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C13857h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9F1DF second address: A9F21E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jl 00007FBE58BB0BBCh 0x0000000b jo 00007FBE58BB0BB6h 0x00000011 popad 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 jmp 00007FBE58BB0BBEh 0x0000001b mov eax, dword ptr [eax] 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FBE58BB0BC6h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9F38B second address: A9F38F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9F38F second address: A9F3CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 add dword ptr [esp], 057928ABh 0x0000000e add edi, 55B6BF22h 0x00000014 lea ebx, dword ptr [ebp+1245AE30h] 0x0000001a push 00000000h 0x0000001c push eax 0x0000001d call 00007FBE58BB0BB8h 0x00000022 pop eax 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 add dword ptr [esp+04h], 00000014h 0x0000002f inc eax 0x00000030 push eax 0x00000031 ret 0x00000032 pop eax 0x00000033 ret 0x00000034 push eax 0x00000035 pushad 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 pop eax 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABEB67 second address: ABEB79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jbe 00007FBE58C13846h 0x0000000c popad 0x0000000d pop edx 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABEB79 second address: ABEB81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABEB81 second address: ABEB8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABEFDB second address: ABEFF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FBE58BB0BBCh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABEFF0 second address: ABEFF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABEFF6 second address: ABF033 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBE58BB0BC8h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FBE58BB0BC5h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jne 00007FBE58BB0BB6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF2E4 second address: ABF2E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF2E8 second address: ABF2F6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FBE58BB0BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF2F6 second address: ABF2FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF2FC second address: ABF300 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF300 second address: ABF308 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF308 second address: ABF312 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FBE58BB0BB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF312 second address: ABF379 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBE58C13846h 0x00000008 jmp 00007FBE58C13854h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esi 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FBE58C1384Bh 0x00000017 pop esi 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pushad 0x0000001b pushad 0x0000001c jns 00007FBE58C13846h 0x00000022 jc 00007FBE58C13846h 0x00000028 popad 0x00000029 jnl 00007FBE58C13854h 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FBE58C13853h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABF67C second address: ABF683 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABFAA1 second address: ABFAA7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABFAA7 second address: ABFAB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABFBFE second address: ABFC0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C1384Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABFC0C second address: ABFC2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABFC2C second address: ABFC32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ABFC32 second address: ABFC4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58BB0BC3h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AB4C2C second address: AB4C39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FBE58C13846h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AB4C39 second address: AB4C57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBE58BB0BC9h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AC08E2 second address: AC0903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C13857h 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AC0B8B second address: AC0B8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AC0B8F second address: AC0B93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AC0B93 second address: AC0BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FBE58BB0BB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop esi 0x0000000d pushad 0x0000000e push ecx 0x0000000f jnl 00007FBE58BB0BB6h 0x00000015 pop ecx 0x00000016 pushad 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACB00F second address: ACB025 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C13852h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACB025 second address: ACB031 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACB031 second address: ACB035 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACB035 second address: ACB045 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBE58BB0BB6h 0x00000008 jc 00007FBE58BB0BB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACA585 second address: ACA589 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACA589 second address: ACA58D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACA8A6 second address: ACA8B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007FBE58C13846h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACA8B4 second address: ACA8B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACA8B8 second address: ACA8C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACA8C4 second address: ACA8F4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBE58BB0BC2h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 jmp 00007FBE58BB0BC2h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACE948 second address: ACE94C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACF016 second address: ACF021 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACF021 second address: ACF03F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FBE58C13853h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACF0B7 second address: ACF107 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jno 00007FBE58BB0BB6h 0x0000000c push esi 0x0000000d pop esi 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 jnl 00007FBE58BB0BBCh 0x00000018 jo 00007FBE58BB0BB6h 0x0000001e jp 00007FBE58BB0BB8h 0x00000024 popad 0x00000025 xchg eax, ebx 0x00000026 mov dword ptr [ebp+122D1C16h], eax 0x0000002c nop 0x0000002d push edi 0x0000002e pushad 0x0000002f jmp 00007FBE58BB0BC6h 0x00000034 pushad 0x00000035 popad 0x00000036 popad 0x00000037 pop edi 0x00000038 push eax 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACFB79 second address: ACFBDF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C13858h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a and di, FF00h 0x0000000f mov di, ax 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007FBE58C13848h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000017h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e jmp 00007FBE58C1384Dh 0x00000033 push 00000000h 0x00000035 or edi, dword ptr [ebp+122D2C67h] 0x0000003b xchg eax, ebx 0x0000003c push eax 0x0000003d push edx 0x0000003e je 00007FBE58C13848h 0x00000044 pushad 0x00000045 popad 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACFBDF second address: ACFC18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FBE58BB0BC2h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f jmp 00007FBE58BB0BC9h 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACFC18 second address: ACFC1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD03D9 second address: AD03DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD2D8A second address: AD2D8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD1F44 second address: AD1F48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD2D8E second address: AD2D94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD1F48 second address: AD1F4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD37C9 second address: AD37D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBE58C1384Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD358C second address: AD3596 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD37D8 second address: AD37F7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBE58C13846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FBE58C1384Fh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD3596 second address: AD359A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD37F7 second address: AD37FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD359A second address: AD359E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD3FA6 second address: AD3FC8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C13854h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a je 00007FBE58C1384Eh 0x00000010 push ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD4DD0 second address: AD4DE6 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBE58BB0BBCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD69E1 second address: AD69E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AD69E5 second address: AD69FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC0h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A83055 second address: A83080 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBE58C13846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d jmp 00007FBE58C1384Fh 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 je 00007FBE58C13846h 0x0000001b push edi 0x0000001c pop edi 0x0000001d popad 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A83080 second address: A83086 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A83086 second address: A83090 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A83090 second address: A830A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 jns 00007FBE58BB0BB6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADB723 second address: ADB728 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADB728 second address: ADB7A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBE58BB0BC4h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push ecx 0x00000013 call 00007FBE58BB0BB8h 0x00000018 pop ecx 0x00000019 mov dword ptr [esp+04h], ecx 0x0000001d add dword ptr [esp+04h], 0000001Bh 0x00000025 inc ecx 0x00000026 push ecx 0x00000027 ret 0x00000028 pop ecx 0x00000029 ret 0x0000002a movzx ebx, bx 0x0000002d mov di, si 0x00000030 push 00000000h 0x00000032 and di, 663Fh 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push edi 0x0000003c call 00007FBE58BB0BB8h 0x00000041 pop edi 0x00000042 mov dword ptr [esp+04h], edi 0x00000046 add dword ptr [esp+04h], 0000001Ah 0x0000004e inc edi 0x0000004f push edi 0x00000050 ret 0x00000051 pop edi 0x00000052 ret 0x00000053 xchg eax, esi 0x00000054 push eax 0x00000055 push edx 0x00000056 jmp 00007FBE58BB0BBAh 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADB922 second address: ADB934 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FBE58C1384Bh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADD828 second address: ADD835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADD835 second address: ADD83B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADD83B second address: ADD850 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBE58BB0BC1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADE8B9 second address: ADE8BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADDA2B second address: ADDAB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 js 00007FBE58BB0BBCh 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f jmp 00007FBE58BB0BC3h 0x00000014 push dword ptr fs:[00000000h] 0x0000001b push 00000000h 0x0000001d push eax 0x0000001e call 00007FBE58BB0BB8h 0x00000023 pop eax 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 add dword ptr [esp+04h], 00000017h 0x00000030 inc eax 0x00000031 push eax 0x00000032 ret 0x00000033 pop eax 0x00000034 ret 0x00000035 mov dword ptr fs:[00000000h], esp 0x0000003c mov bx, dx 0x0000003f mov eax, dword ptr [ebp+122D0A89h] 0x00000045 mov edi, 7C74B1E1h 0x0000004a push FFFFFFFFh 0x0000004c mov bx, di 0x0000004f nop 0x00000050 jmp 00007FBE58BB0BC6h 0x00000055 push eax 0x00000056 pushad 0x00000057 pushad 0x00000058 push ecx 0x00000059 pop ecx 0x0000005a push edi 0x0000005b pop edi 0x0000005c popad 0x0000005d pushad 0x0000005e push ebx 0x0000005f pop ebx 0x00000060 push eax 0x00000061 push edx 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADE8BE second address: ADE8C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FBE58C13846h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADE8C8 second address: ADE8CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADE8CC second address: ADE8DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FBE58C13848h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADF7DA second address: ADF851 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58BB0BC0h 0x00000009 popad 0x0000000a pop ebx 0x0000000b push eax 0x0000000c pushad 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 pop edx 0x00000011 jno 00007FBE58BB0BBCh 0x00000017 popad 0x00000018 nop 0x00000019 push 00000000h 0x0000001b push edi 0x0000001c call 00007FBE58BB0BB8h 0x00000021 pop edi 0x00000022 mov dword ptr [esp+04h], edi 0x00000026 add dword ptr [esp+04h], 00000015h 0x0000002e inc edi 0x0000002f push edi 0x00000030 ret 0x00000031 pop edi 0x00000032 ret 0x00000033 jmp 00007FBE58BB0BBEh 0x00000038 push 00000000h 0x0000003a pushad 0x0000003b push edi 0x0000003c push ebx 0x0000003d pop edx 0x0000003e pop edx 0x0000003f mov ebx, dword ptr [ebp+122D331Dh] 0x00000045 popad 0x00000046 push edx 0x00000047 mov edi, dword ptr [ebp+122D25AAh] 0x0000004d pop edi 0x0000004e push 00000000h 0x00000050 xchg eax, esi 0x00000051 push ecx 0x00000052 push eax 0x00000053 push edx 0x00000054 jo 00007FBE58BB0BB6h 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE185D second address: AE1862 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADFA70 second address: ADFA74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE1862 second address: AE18D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jns 00007FBE58C13846h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov bh, ch 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007FBE58C13848h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b mov bx, D907h 0x0000002f mov edi, dword ptr [ebp+122D25A4h] 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push ebp 0x0000003a call 00007FBE58C13848h 0x0000003f pop ebp 0x00000040 mov dword ptr [esp+04h], ebp 0x00000044 add dword ptr [esp+04h], 0000001Ah 0x0000004c inc ebp 0x0000004d push ebp 0x0000004e ret 0x0000004f pop ebp 0x00000050 ret 0x00000051 push eax 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 jmp 00007FBE58C1384Dh 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ADFA74 second address: ADFA96 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FBE58BB0BC7h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE18D3 second address: AE18D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE2707 second address: AE271E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BBFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE271E second address: AE2738 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBE58C13846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c jc 00007FBE58C13854h 0x00000012 push eax 0x00000013 push edx 0x00000014 ja 00007FBE58C13846h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE2738 second address: AE275A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 or dword ptr [ebp+122D1ADAh], eax 0x0000000d push 00000000h 0x0000000f movzx edi, si 0x00000012 push 00000000h 0x00000014 or edi, 7378164Eh 0x0000001a xchg eax, esi 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE275A second address: AE275F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE36A5 second address: AE36B3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007FBE58BB0BB6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE480A second address: AE482B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C13852h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d jg 00007FBE58C13846h 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE482B second address: AE48AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a movsx ebx, bx 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push ebx 0x00000015 and edi, dword ptr [ebp+122D2A07h] 0x0000001b pop ebx 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 push 00000000h 0x00000025 push eax 0x00000026 call 00007FBE58BB0BB8h 0x0000002b pop eax 0x0000002c mov dword ptr [esp+04h], eax 0x00000030 add dword ptr [esp+04h], 0000001Ah 0x00000038 inc eax 0x00000039 push eax 0x0000003a ret 0x0000003b pop eax 0x0000003c ret 0x0000003d push ecx 0x0000003e xor dword ptr [ebp+122D1F61h], edi 0x00000044 pop edi 0x00000045 mov eax, dword ptr [ebp+122D0609h] 0x0000004b add dword ptr [ebp+12482049h], edi 0x00000051 push FFFFFFFFh 0x00000053 jg 00007FBE58BB0BBBh 0x00000059 push eax 0x0000005a jo 00007FBE58BB0BC0h 0x00000060 push eax 0x00000061 push edx 0x00000062 pushad 0x00000063 popad 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE5792 second address: AE579C instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBE58C13846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE6699 second address: AE6711 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007FBE58BB0BB8h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 cmc 0x00000028 push 00000000h 0x0000002a mov dword ptr [ebp+1245FEDFh], eax 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push eax 0x00000035 call 00007FBE58BB0BB8h 0x0000003a pop eax 0x0000003b mov dword ptr [esp+04h], eax 0x0000003f add dword ptr [esp+04h], 00000017h 0x00000047 inc eax 0x00000048 push eax 0x00000049 ret 0x0000004a pop eax 0x0000004b ret 0x0000004c sbb bx, CA70h 0x00000051 push edx 0x00000052 mov dword ptr [ebp+12482011h], ebx 0x00000058 pop edi 0x00000059 push eax 0x0000005a push eax 0x0000005b push edx 0x0000005c push ebx 0x0000005d push eax 0x0000005e push edx 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE6711 second address: AE6716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE6716 second address: AE672C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBE58BB0BC2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE672C second address: AE6730 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE777C second address: AE7787 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE693F second address: AE6950 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE6950 second address: AE6956 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE6956 second address: AE6960 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBE58C1384Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE7948 second address: AE795B instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FBE58BB0BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jne 00007FBE58BB0BB6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AEB977 second address: AEB97F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AE995A second address: AE995E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8415 second address: AF841F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FBE58C13846h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF841F second address: AF8433 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FBE58BB0BB6h 0x00000008 jne 00007FBE58BB0BB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8433 second address: AF8439 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8439 second address: AF843D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF843D second address: AF8441 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A9230B second address: A92311 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A92311 second address: A92315 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8BE0 second address: AF8C07 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBE58BB0BB8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBE58BB0BC6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8C07 second address: AF8C0D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8C0D second address: AF8C26 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBE58BB0BB8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 je 00007FBE58BB0BB6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8DB4 second address: AF8DB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AF8DB8 second address: AF8DF5 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBE58BB0BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e js 00007FBE58BB0BB6h 0x00000014 pop esi 0x00000015 pop edx 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a jmp 00007FBE58BB0BC3h 0x0000001f mov eax, dword ptr [eax] 0x00000021 js 00007FBE58BB0BC2h 0x00000027 jl 00007FBE58BB0BBCh 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A8B632 second address: A8B638 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A8B638 second address: A8B663 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FBE58BB0BC0h 0x0000000b jmp 00007FBE58BB0BC3h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A8B663 second address: A8B668 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFDD18 second address: AFDD22 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBE58BB0BC2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFDD22 second address: AFDD28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFDD28 second address: AFDD37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 js 00007FBE58BB0BB6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE2EB second address: AFE2EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE556 second address: AFE568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FBE58BB0BB6h 0x0000000a jnc 00007FBE58BB0BB6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE568 second address: AFE586 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnp 00007FBE58C13859h 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FBE58C13851h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE586 second address: AFE59E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 jl 00007FBE58BB0BB6h 0x0000000b pop edx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 ja 00007FBE58BB0BBCh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE59E second address: AFE5A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE5A2 second address: AFE5A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE9C4 second address: AFE9CF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jno 00007FBE58C13846h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFE9CF second address: AFE9DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jne 00007FBE58BB0BBCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFEE14 second address: AFEE20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FBE58C13846h 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AFEE20 second address: AFEE34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBE58BB0BBAh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B033EC second address: B03404 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 jmp 00007FBE58C1384Fh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03533 second address: B03543 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBE58BB0BB8h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B036AC second address: B036E8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FBE58C13846h 0x00000008 jmp 00007FBE58C13857h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007FBE58C13853h 0x00000015 push edi 0x00000016 pop edi 0x00000017 pushad 0x00000018 popad 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B036E8 second address: B036F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FBE58BB0BB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03860 second address: B03866 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03866 second address: B03888 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 je 00007FBE58BB0BB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 pop ecx 0x00000012 ja 00007FBE58BB0BB8h 0x00000018 push edi 0x00000019 pop edi 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push ebx 0x0000001f pop ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03888 second address: B03895 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007FBE58C1384Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03895 second address: B03899 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03899 second address: B0389E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03B90 second address: B03BA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edi 0x00000006 jc 00007FBE58BB0BB6h 0x0000000c pop edi 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push esi 0x00000012 pop esi 0x00000013 pushad 0x00000014 popad 0x00000015 push edx 0x00000016 pop edx 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B03BA8 second address: B03BB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B040D7 second address: B040DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B040DD second address: B04100 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FBE58C13857h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B04100 second address: B0413F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FBE58BB0BBCh 0x00000013 jmp 00007FBE58BB0BC9h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B0413F second address: B04143 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B04143 second address: B04153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FBE58BB0BB8h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AB57E6 second address: AB57EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: AB57EA second address: AB580E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007FBE58BB0BBAh 0x0000000c jbe 00007FBE58BB0BB6h 0x00000012 pop edi 0x00000013 jo 00007FBE58BB0BDAh 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACCDE1 second address: ACCDE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACCDE7 second address: ACCDEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACCDEB second address: ACCE7A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push esi 0x0000000c call 00007FBE58C13848h 0x00000011 pop esi 0x00000012 mov dword ptr [esp+04h], esi 0x00000016 add dword ptr [esp+04h], 00000017h 0x0000001e inc esi 0x0000001f push esi 0x00000020 ret 0x00000021 pop esi 0x00000022 ret 0x00000023 mov edx, dword ptr [ebp+122D2BEBh] 0x00000029 mov edx, dword ptr [ebp+122D2B0Fh] 0x0000002f lea eax, dword ptr [ebp+12488B37h] 0x00000035 push 00000000h 0x00000037 push ebx 0x00000038 call 00007FBE58C13848h 0x0000003d pop ebx 0x0000003e mov dword ptr [esp+04h], ebx 0x00000042 add dword ptr [esp+04h], 0000001Dh 0x0000004a inc ebx 0x0000004b push ebx 0x0000004c ret 0x0000004d pop ebx 0x0000004e ret 0x0000004f mov dword ptr [ebp+122D1FEEh], ecx 0x00000055 mov dword ptr [ebp+122D1C0Ch], esi 0x0000005b nop 0x0000005c jmp 00007FBE58C13858h 0x00000061 push eax 0x00000062 push eax 0x00000063 push edx 0x00000064 jg 00007FBE58C13848h 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACCE7A second address: AB4C2C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBE58BB0BCFh 0x00000008 jmp 00007FBE58BB0BC9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007FBE58BB0BB8h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 00000014h 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a cld 0x0000002b pushad 0x0000002c mov dword ptr [ebp+122D1FD0h], edi 0x00000032 call 00007FBE58BB0BBDh 0x00000037 cld 0x00000038 pop eax 0x00000039 popad 0x0000003a call dword ptr [ebp+122D1D6Eh] 0x00000040 push eax 0x00000041 push edx 0x00000042 jno 00007FBE58BB0BCBh 0x00000048 pushad 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD0CD second address: ACD0D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD0D7 second address: ACD0F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jo 00007FBE58BB0BB6h 0x00000012 jg 00007FBE58BB0BB6h 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD0F0 second address: ACD0F5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD444 second address: ACD48E instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBE58BB0BC4h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 4A74FD34h 0x00000011 mov dword ptr [ebp+12481AFBh], ebx 0x00000017 call 00007FBE58BB0BB9h 0x0000001c push ecx 0x0000001d jo 00007FBE58BB0BB8h 0x00000023 push edi 0x00000024 pop edi 0x00000025 pop ecx 0x00000026 push eax 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FBE58BB0BBFh 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD48E second address: ACD4B8 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBE58C13848h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FBE58C13858h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD4B8 second address: ACD4DC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FBE58BB0BBEh 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d jnp 00007FBE58BB0BC4h 0x00000013 push eax 0x00000014 push edx 0x00000015 jp 00007FBE58BB0BB6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD4DC second address: ACD500 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a pushad 0x0000000b push edx 0x0000000c jmp 00007FBE58C1384Eh 0x00000011 pop edx 0x00000012 pushad 0x00000013 jns 00007FBE58C13846h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD5F9 second address: ACD5FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD66D second address: ACD672 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD672 second address: ACD678 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD678 second address: ACD6B2 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBE58C13846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], esi 0x0000000f push 00000000h 0x00000011 push ebp 0x00000012 call 00007FBE58C13848h 0x00000017 pop ebp 0x00000018 mov dword ptr [esp+04h], ebp 0x0000001c add dword ptr [esp+04h], 00000016h 0x00000024 inc ebp 0x00000025 push ebp 0x00000026 ret 0x00000027 pop ebp 0x00000028 ret 0x00000029 mov dl, bl 0x0000002b push eax 0x0000002c jo 00007FBE58C13854h 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD6B2 second address: ACD6B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACD8DA second address: ACD8DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACDA0D second address: ACDA3E instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBE58BB0BBCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b sub dword ptr [ebp+124689E4h], ecx 0x00000011 push 00000004h 0x00000013 mov dword ptr [ebp+122D3544h], esi 0x00000019 push eax 0x0000001a pushad 0x0000001b push esi 0x0000001c jmp 00007FBE58BB0BBAh 0x00000021 pop esi 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACDFC5 second address: ACE007 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jc 00007FBE58C13852h 0x0000000f jmp 00007FBE58C1384Ch 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 jmp 00007FBE58C13858h 0x0000001d mov eax, dword ptr [eax] 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 jns 00007FBE58C13846h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACE0B4 second address: ACE0D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jns 00007FBE58BB0BBCh 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBE58BB0BBFh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACE0D8 second address: ACE0F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBE58C13855h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACE0F1 second address: ACE181 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 sub dword ptr [ebp+122D1AA4h], edx 0x0000000f lea eax, dword ptr [ebp+12488B7Bh] 0x00000015 push 00000000h 0x00000017 push ecx 0x00000018 call 00007FBE58BB0BB8h 0x0000001d pop ecx 0x0000001e mov dword ptr [esp+04h], ecx 0x00000022 add dword ptr [esp+04h], 00000017h 0x0000002a inc ecx 0x0000002b push ecx 0x0000002c ret 0x0000002d pop ecx 0x0000002e ret 0x0000002f mov dh, bh 0x00000031 sub dx, 45A3h 0x00000036 nop 0x00000037 jne 00007FBE58BB0BC9h 0x0000003d push eax 0x0000003e jnp 00007FBE58BB0BCFh 0x00000044 nop 0x00000045 mov dword ptr [ebp+12481FE5h], eax 0x0000004b mov dword ptr [ebp+122D1D17h], edx 0x00000051 lea eax, dword ptr [ebp+12488B37h] 0x00000057 mov ecx, edi 0x00000059 nop 0x0000005a pushad 0x0000005b push eax 0x0000005c push edx 0x0000005d push ebx 0x0000005e pop ebx 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACE181 second address: ACE19B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FBE58C13848h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 jp 00007FBE58C13854h 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACE19B second address: ACE19F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACE19F second address: AB580E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 sub dword ptr [ebp+122D1B30h], eax 0x0000000d call dword ptr [ebp+122D1FBFh] 0x00000013 ja 00007FBE58C1386Ch 0x00000019 jo 00007FBE58C1386Ah 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 pushad 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B09BDF second address: B09BE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B09D64 second address: B09D76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBE58C1384Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B0CFBE second address: B0CFCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FBE58BB0BBAh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B104FA second address: B10500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B10500 second address: B10508 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B11CE7 second address: B11D18 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C13852h 0x00000007 jl 00007FBE58C13848h 0x0000000d push esi 0x0000000e pop esi 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push edx 0x00000012 jc 00007FBE58C1384Eh 0x00000018 pushad 0x00000019 popad 0x0000001a jne 00007FBE58C13846h 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B17484 second address: B174A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FBE58BB0BC1h 0x0000000c jp 00007FBE58BB0BB6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B174A2 second address: B174A8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B174A8 second address: B17502 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FBE58BB0BC9h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 popad 0x00000011 popad 0x00000012 pushad 0x00000013 js 00007FBE58BB0BC7h 0x00000019 jmp 00007FBE58BB0BC1h 0x0000001e jmp 00007FBE58BB0BBBh 0x00000023 push eax 0x00000024 push edx 0x00000025 push esi 0x00000026 pop esi 0x00000027 jmp 00007FBE58BB0BBDh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16311 second address: B16315 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16315 second address: B1631B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1631B second address: B1633A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FBE58C13846h 0x00000009 jmp 00007FBE58C1384Dh 0x0000000e popad 0x0000000f jne 00007FBE58C13852h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1633A second address: B16340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16340 second address: B16356 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FBE58C1384Bh 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16356 second address: B16366 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16366 second address: B1636A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1679A second address: B167A0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B167A0 second address: B167A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B167A6 second address: B167F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBE58BB0BC2h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007FBE58BB0BC3h 0x00000011 jg 00007FBE58BB0BB6h 0x00000017 jmp 00007FBE58BB0BBEh 0x0000001c jnp 00007FBE58BB0BB6h 0x00000022 popad 0x00000023 pop edx 0x00000024 pop eax 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B167F4 second address: B1680A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FBE58C1384Eh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1680A second address: B1680E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1680E second address: B1681A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1681A second address: B1681E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16C73 second address: B16C77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16C77 second address: B16C88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jo 00007FBE58BB0BD7h 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B16DD7 second address: B16DDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B171D5 second address: B171DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B171DB second address: B171F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C13855h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1A59E second address: B1A5A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1D567 second address: B1D58D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C13856h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jns 00007FBE58C13846h 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1CE2E second address: B1CE55 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007FBE58BB0BC7h 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1CE55 second address: B1CE59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1D009 second address: B1D00F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1D00F second address: B1D015 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1D015 second address: B1D019 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1D149 second address: B1D15C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FBE58C1384Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B1D28D second address: B1D2B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FBE58BB0BB6h 0x0000000a jmp 00007FBE58BB0BC9h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B22963 second address: B22968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B22968 second address: B2296E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B2296E second address: B2299A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBE58C1384Ch 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBE58C13852h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B2299A second address: B2299E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B2299E second address: B229A8 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FBE58C13846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B229A8 second address: B229B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B22CC7 second address: B22CD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B22F9E second address: B22FAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FBE58BB0BB6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACDBC2 second address: ACDBC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACDBC7 second address: ACDBCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACDBCD second address: ACDBD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: ACDBD1 second address: ACDC2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBE58BB0BC5h 0x0000000f pop edx 0x00000010 nop 0x00000011 add ch, 00000054h 0x00000014 mov ebx, dword ptr [ebp+12488B76h] 0x0000001a clc 0x0000001b add eax, ebx 0x0000001d push ecx 0x0000001e mov ecx, dword ptr [ebp+122D2B0Bh] 0x00000024 pop edi 0x00000025 nop 0x00000026 pushad 0x00000027 push eax 0x00000028 jne 00007FBE58BB0BB6h 0x0000002e pop eax 0x0000002f jmp 00007FBE58BB0BBAh 0x00000034 popad 0x00000035 push eax 0x00000036 pushad 0x00000037 ja 00007FBE58BB0BBCh 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B233F2 second address: B233F7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B233F7 second address: B23442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FBE58BB0BB6h 0x0000000a pop ebx 0x0000000b jg 00007FBE58BB0BCFh 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jng 00007FBE58BB0BB8h 0x0000001b pushad 0x0000001c popad 0x0000001d jmp 00007FBE58BB0BC5h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B2756E second address: B27572 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B27572 second address: B27592 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007FBE58BB0BB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FBE58BB0BC4h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B27592 second address: B275B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FBE58C13859h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B275B1 second address: B275B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B275B5 second address: B275C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B275C3 second address: B275C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B2771B second address: B2771F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B2786F second address: B27879 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FBE58BB0BB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B27879 second address: B2787D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B2787D second address: B27883 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B27883 second address: B278B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FBE58C13858h 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBE58C1384Bh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B27A35 second address: B27A3F instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBE58BB0BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B3430B second address: B34343 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBE58C13855h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FBE58C13859h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B32C04 second address: B32C08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B32C08 second address: B32C0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B32C0C second address: B32C1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FBE58BB0BB8h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B32EF0 second address: B32EF6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B32EF6 second address: B32F34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 push esi 0x0000000a pop esi 0x0000000b jmp 00007FBE58BB0BC8h 0x00000010 popad 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007FBE58BB0BC5h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B331ED second address: B33212 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBE58C13852h 0x00000008 jmp 00007FBE58C1384Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B33B00 second address: B33B04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B33B04 second address: B33B10 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBE58C13846h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B33B10 second address: B33B16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B33B16 second address: B33B2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C13854h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B33B2E second address: B33B32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B33B32 second address: B33B38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A8654E second address: A86556 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B376F0 second address: B376F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B37C73 second address: B37C87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jmp 00007FBE58BB0BBBh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B380BB second address: B380D7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBE58C13846h 0x00000008 jmp 00007FBE58C13852h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A93CF7 second address: A93D0A instructions: 0x00000000 rdtsc 0x00000002 je 00007FBE58BB0BB6h 0x00000008 jnc 00007FBE58BB0BB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: A93D0A second address: A93D38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FBE58C13846h 0x0000000a pop edi 0x0000000b jmp 00007FBE58C13856h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jnc 00007FBE58C1384Ah 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B46A0E second address: B46A14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B46A14 second address: B46A19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B44FFC second address: B45006 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBE58BB0BC2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B45006 second address: B4500C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4500C second address: B45013 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B45589 second address: B4558D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4558D second address: B455A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FBE58BB0BBEh 0x0000000c pushad 0x0000000d popad 0x0000000e ja 00007FBE58BB0BB6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B455A1 second address: B455A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4575D second address: B457BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBE58BB0BC9h 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FBE58BB0BC0h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 jng 00007FBE58BB0BE7h 0x00000018 pushad 0x00000019 push esi 0x0000001a pop esi 0x0000001b pushad 0x0000001c popad 0x0000001d jmp 00007FBE58BB0BBBh 0x00000022 pushad 0x00000023 popad 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 jmp 00007FBE58BB0BC0h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B457BB second address: B457BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B458D7 second address: B458DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B45A39 second address: B45A3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B45A3F second address: B45A4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B45A4A second address: B45A4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B45A4E second address: B45A52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4477A second address: B44781 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4CE97 second address: B4CEC8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 jng 00007FBE58BB0BB6h 0x0000000b pop edx 0x0000000c jmp 00007FBE58BB0BC5h 0x00000011 pop edx 0x00000012 pop eax 0x00000013 jng 00007FBE58BB0BDAh 0x00000019 push eax 0x0000001a push edx 0x0000001b jg 00007FBE58BB0BB6h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4D151 second address: B4D169 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C1384Ah 0x00000009 push eax 0x0000000a push edx 0x0000000b jns 00007FBE58C13846h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4D169 second address: B4D16D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B4D16D second address: B4D186 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBE58C13846h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b jc 00007FBE58C13858h 0x00000011 js 00007FBE58C13852h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BB6B second address: B5BB6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BB6F second address: B5BB73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BB73 second address: B5BB7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BB7D second address: B5BB83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BB83 second address: B5BB87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BCF5 second address: B5BCFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FBE58C13846h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BCFF second address: B5BD05 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B5BD05 second address: B5BD13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBE58C1384Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B74D1C second address: B74D35 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BBAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pop edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B74E77 second address: B74E7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B74E7D second address: B74E81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B74FC6 second address: B74FCC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B7512D second address: B75131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B75131 second address: B75155 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C1384Ch 0x00000007 jmp 00007FBE58C13854h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B752D9 second address: B752DF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B752DF second address: B752E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B75428 second address: B7542C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B7542C second address: B75434 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B7573D second address: B75743 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B76187 second address: B7618C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B7618C second address: B76194 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B89960 second address: B89966 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B89966 second address: B89982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58BB0BC7h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B8979F second address: B897BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FBE58C13858h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B897BE second address: B897C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B841E0 second address: B841E5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B841E5 second address: B84219 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push ebx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop ebx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jbe 00007FBE58BB0BC2h 0x00000015 jmp 00007FBE58BB0BC3h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B981C3 second address: B981DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBE58C13855h 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B981DD second address: B98203 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jns 00007FBE58BB0BB6h 0x0000000b pop ecx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 jmp 00007FBE58BB0BC4h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B97EDE second address: B97EE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B97EE2 second address: B97EF7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BBBh 0x00000007 jg 00007FBE58BB0BB6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B97EF7 second address: B97EFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: B97EFD second address: B97F01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC816 second address: BAC81B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC81B second address: BAC839 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBE58BB0BB8h 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBE58BB0BC2h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC984 second address: BAC988 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC988 second address: BAC992 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBE58BB0BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC992 second address: BAC99C instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBE58C1384Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC99C second address: BAC9A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC9A6 second address: BAC9AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC9AC second address: BAC9C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 popad 0x00000009 push edi 0x0000000a jng 00007FBE58BB0BB6h 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 jnp 00007FBE58BB0BB6h 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAC9C7 second address: BAC9CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BACAF8 second address: BACB41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FBE58BB0BB6h 0x0000000a jmp 00007FBE58BB0BBBh 0x0000000f popad 0x00000010 jne 00007FBE58BB0BC6h 0x00000016 pop ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a jc 00007FBE58BB0BB6h 0x00000020 pushad 0x00000021 popad 0x00000022 push esi 0x00000023 pop esi 0x00000024 push ebx 0x00000025 pop ebx 0x00000026 popad 0x00000027 pushad 0x00000028 jp 00007FBE58BB0BB6h 0x0000002e pushad 0x0000002f popad 0x00000030 push ebx 0x00000031 pop ebx 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BACDC0 second address: BACDE2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jbe 00007FBE58C13846h 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FBE58C13854h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BACF45 second address: BACF5F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 pop edi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c ja 00007FBE58BB0BB6h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BACF5F second address: BACF6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BACF6A second address: BACF70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BACF70 second address: BACF76 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD113 second address: BAD117 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD117 second address: BAD11D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD11D second address: BAD132 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC0h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD27F second address: BAD29E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58C13858h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD43E second address: BAD448 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD448 second address: BAD44C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD44C second address: BAD480 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BC8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f jmp 00007FBE58BB0BC0h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD480 second address: BAD486 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BAD486 second address: BAD4A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FBE58BB0BC5h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BB0489 second address: BB048D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BB048D second address: BB04AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a pop edi 0x0000000b pushad 0x0000000c jmp 00007FBE58BB0BC0h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BB4512 second address: BB4518 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BB7FD7 second address: BB7FE7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 je 00007FBE58BB0BB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BB7FE7 second address: BB7FED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BB7FED second address: BB8005 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBE58BB0BBEh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\469oyXQbRY.exe | RDTSC instruction interceptor: First address: BB8005 second address: BB8009 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |