Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A28850 | 0_2_00A28850 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACC0BA | 0_2_00ACC0BA |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD20BB | 0_2_00AD20BB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B760A9 | 0_2_00B760A9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5C09D | 0_2_00B5C09D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B16089 | 0_2_00B16089 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B040FA | 0_2_00B040FA |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6C0E7 | 0_2_00B6C0E7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB80F8 | 0_2_00AB80F8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAE0F5 | 0_2_00AAE0F5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B640D0 | 0_2_00B640D0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B24032 | 0_2_00B24032 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B54018 | 0_2_00B54018 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB601C | 0_2_00AB601C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A88013 | 0_2_00A88013 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC0017 | 0_2_00AC0017 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA806F | 0_2_00AA806F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3C060 | 0_2_00B3C060 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8E071 | 0_2_00A8E071 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD6040 | 0_2_00AD6040 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B34044 | 0_2_00B34044 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB4056 | 0_2_00AB4056 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B441A5 | 0_2_00B441A5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6A1A1 | 0_2_00B6A1A1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B38196 | 0_2_00B38196 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A42190 | 0_2_00A42190 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5218D | 0_2_00B5218D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE8195 | 0_2_00AE8195 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2C1F1 | 0_2_00B2C1F1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC61F8 | 0_2_00AC61F8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A441C0 | 0_2_00A441C0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE21C7 | 0_2_00AE21C7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACE1D5 | 0_2_00ACE1D5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC212C | 0_2_00AC212C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE413F | 0_2_00AE413F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B26123 | 0_2_00B26123 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B20110 | 0_2_00B20110 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B40104 | 0_2_00B40104 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABA167 | 0_2_00ABA167 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B28163 | 0_2_00B28163 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B22165 | 0_2_00B22165 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0C140 | 0_2_00B0C140 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B142B0 | 0_2_00B142B0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B562B4 | 0_2_00B562B4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7C2B5 | 0_2_00B7C2B5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B482B9 | 0_2_00B482B9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A26280 | 0_2_00A26280 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B58296 | 0_2_00B58296 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF0285 | 0_2_00AF0285 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A3E290 | 0_2_00A3E290 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC429F | 0_2_00AC429F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B662FF | 0_2_00B662FF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFA2F5 | 0_2_00AFA2F5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD22C7 | 0_2_00AD22C7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4C2DF | 0_2_00B4C2DF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7A2C6 | 0_2_00B7A2C6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A88220 | 0_2_00A88220 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0E222 | 0_2_00B0E222 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE623A | 0_2_00AE623A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0A21A | 0_2_00B0A21A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A36263 | 0_2_00A36263 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B72276 | 0_2_00B72276 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3227F | 0_2_00B3227F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2E252 | 0_2_00B2E252 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4A254 | 0_2_00B4A254 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8224B | 0_2_00A8224B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB024E | 0_2_00AB024E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2A257 | 0_2_00B2A257 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE0244 | 0_2_00AE0244 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF6243 | 0_2_00AF6243 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3E242 | 0_2_00B3E242 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEE25D | 0_2_00AEE25D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4E24F | 0_2_00B4E24F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6224D | 0_2_00B6224D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A98254 | 0_2_00A98254 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1224C | 0_2_00B1224C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A983BE | 0_2_00A983BE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A44380 | 0_2_00A44380 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF8383 | 0_2_00AF8383 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BE038F | 0_2_00BE038F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B743F0 | 0_2_00B743F0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABE3E1 | 0_2_00ABE3E1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4C3FC | 0_2_00A4C3FC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A823F3 | 0_2_00A823F3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BEA3D2 | 0_2_00BEA3D2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A24320 | 0_2_00A24320 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B50331 | 0_2_00B50331 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A28330 | 0_2_00A28330 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC833A | 0_2_00AC833A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEA339 | 0_2_00AEA339 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4A33F | 0_2_00A4A33F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4830D | 0_2_00A4830D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9631B | 0_2_00A9631B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1C367 | 0_2_00B1C367 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7835B | 0_2_00B7835B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB2344 | 0_2_00AB2344 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD24B8 | 0_2_00AD24B8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB04B1 | 0_2_00AB04B1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD64B0 | 0_2_00AD64B0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B224AC | 0_2_00B224AC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B64491 | 0_2_00B64491 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA64E3 | 0_2_00AA64E3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB84E2 | 0_2_00AB84E2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACC4E2 | 0_2_00ACC4E2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABC4FC | 0_2_00ABC4FC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADE4F6 | 0_2_00ADE4F6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B204D7 | 0_2_00B204D7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC04DB | 0_2_00AC04DB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B444C3 | 0_2_00B444C3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD04D7 | 0_2_00AD04D7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B004CF | 0_2_00B004CF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB4432 | 0_2_00AB4432 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6A410 | 0_2_00B6A410 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8A411 | 0_2_00A8A411 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B12462 | 0_2_00B12462 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3446C | 0_2_00B3446C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADC442 | 0_2_00ADC442 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB6455 | 0_2_00AB6455 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1E5B8 | 0_2_00B1E5B8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0E5AA | 0_2_00B0E5AA |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B405FC | 0_2_00B405FC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B605FB | 0_2_00B605FB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B545E4 | 0_2_00B545E4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B725E6 | 0_2_00B725E6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC65FF | 0_2_00AC65FF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB25F1 | 0_2_00AB25F1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5E5DC | 0_2_00B5E5DC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A925DC | 0_2_00A925DC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B04534 | 0_2_00B04534 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9E525 | 0_2_00A9E525 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A80526 | 0_2_00A80526 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFC539 | 0_2_00AFC539 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0A52C | 0_2_00B0A52C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5451F | 0_2_00B5451F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A42510 | 0_2_00A42510 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAE51C | 0_2_00AAE51C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEC569 | 0_2_00AEC569 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7657E | 0_2_00B7657E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2656E | 0_2_00B2656E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2456F | 0_2_00B2456F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B52544 | 0_2_00B52544 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB66A7 | 0_2_00AB66A7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD06A2 | 0_2_00AD06A2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE86B6 | 0_2_00AE86B6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABC683 | 0_2_00ABC683 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC2680 | 0_2_00AC2680 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1269D | 0_2_00B1269D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4E687 | 0_2_00B4E687 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE66FB | 0_2_00AE66FB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0C6E9 | 0_2_00B0C6E9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B626EA | 0_2_00B626EA |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A866F5 | 0_2_00A866F5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAA6C8 | 0_2_00AAA6C8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A486C0 | 0_2_00A486C0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADA6C5 | 0_2_00ADA6C5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5A6D8 | 0_2_00B5A6D8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB06C5 | 0_2_00AB06C5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A466D0 | 0_2_00A466D0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC46D3 | 0_2_00AC46D3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE062D | 0_2_00AE062D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A86620 | 0_2_00A86620 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF4622 | 0_2_00AF4622 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B50624 | 0_2_00B50624 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4A621 | 0_2_00B4A621 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A94630 | 0_2_00A94630 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6C617 | 0_2_00B6C617 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B02612 | 0_2_00B02612 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7E610 | 0_2_00B7E610 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3E675 | 0_2_00B3E675 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD6662 | 0_2_00AD6662 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A96675 | 0_2_00A96675 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B06649 | 0_2_00B06649 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD4656 | 0_2_00AD4656 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACA650 | 0_2_00ACA650 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4C64A | 0_2_00B4C64A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5664B | 0_2_00B5664B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B647B8 | 0_2_00B647B8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEA7A1 | 0_2_00AEA7A1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A2A780 | 0_2_00A2A780 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7079F | 0_2_00B7079F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A38792 | 0_2_00A38792 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF879D | 0_2_00AF879D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B56789 | 0_2_00B56789 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A987F9 | 0_2_00A987F9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC87F4 | 0_2_00AC87F4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B527E8 | 0_2_00B527E8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A3E7C0 | 0_2_00A3E7C0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7C736 | 0_2_00B7C736 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFE722 | 0_2_00AFE722 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2A726 | 0_2_00B2A726 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFA702 | 0_2_00AFA702 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A26710 | 0_2_00A26710 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADC719 | 0_2_00ADC719 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8C77F | 0_2_00A8C77F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8A748 | 0_2_00A8A748 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB8748 | 0_2_00AB8748 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B78742 | 0_2_00B78742 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B228B3 | 0_2_00B228B3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B088B2 | 0_2_00B088B2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B368B9 | 0_2_00B368B9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFC8A3 | 0_2_00AFC8A3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA68A4 | 0_2_00AA68A4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A2C8B6 | 0_2_00A2C8B6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BDE8A6 | 0_2_00BDE8A6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B24897 | 0_2_00B24897 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB4880 | 0_2_00AB4880 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A88885 | 0_2_00A88885 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5C8E0 | 0_2_00B5C8E0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE48F1 | 0_2_00AE48F1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A488CB | 0_2_00A488CB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A988DF | 0_2_00A988DF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A3682D | 0_2_00A3682D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A80809 | 0_2_00A80809 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7A810 | 0_2_00B7A810 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A58810 | 0_2_00A58810 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABE810 | 0_2_00ABE810 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD886F | 0_2_00AD886F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B58871 | 0_2_00B58871 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8284B | 0_2_00A8284B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5A85D | 0_2_00B5A85D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4E845 | 0_2_00B4E845 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B04847 | 0_2_00B04847 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B76998 | 0_2_00B76998 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4A9EA | 0_2_00B4A9EA |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD49C2 | 0_2_00AD49C2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BD49CC | 0_2_00BD49CC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACC924 | 0_2_00ACC924 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0292A | 0_2_00B0292A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A40939 | 0_2_00A40939 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACA933 | 0_2_00ACA933 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B78917 | 0_2_00B78917 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA4900 | 0_2_00AA4900 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1C909 | 0_2_00B1C909 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA0913 | 0_2_00AA0913 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD2912 | 0_2_00AD2912 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BE8975 | 0_2_00BE8975 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2697D | 0_2_00B2697D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A50940 | 0_2_00A50940 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAE95F | 0_2_00AAE95F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4694F | 0_2_00B4694F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA4AAE | 0_2_00AA4AAE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB6AA3 | 0_2_00AB6AA3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABAAA1 | 0_2_00ABAAA1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B38AA7 | 0_2_00B38AA7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE8AB1 | 0_2_00AE8AB1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0AA90 | 0_2_00B0AA90 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B12A90 | 0_2_00B12A90 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B18A99 | 0_2_00B18A99 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC0A92 | 0_2_00AC0A92 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF8AEC | 0_2_00AF8AEC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC6AE3 | 0_2_00AC6AE3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B44AC6 | 0_2_00B44AC6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4CAD0 | 0_2_00A4CAD0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF4AD1 | 0_2_00AF4AD1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A96A2A | 0_2_00A96A2A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABCA26 | 0_2_00ABCA26 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5EA21 | 0_2_00B5EA21 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B40A10 | 0_2_00B40A10 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9AA07 | 0_2_00A9AA07 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A2EA10 | 0_2_00A2EA10 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2EA05 | 0_2_00B2EA05 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0EA0E | 0_2_00B0EA0E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADAA6E | 0_2_00ADAA6E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACEA4F | 0_2_00ACEA4F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4CA49 | 0_2_00A4CA49 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEEA5A | 0_2_00AEEA5A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8EBB4 | 0_2_00A8EBB4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA2B83 | 0_2_00AA2B83 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B42BF4 | 0_2_00B42BF4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF2BE3 | 0_2_00AF2BE3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6ABCC | 0_2_00B6ABCC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9CB2C | 0_2_00A9CB2C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4CB22 | 0_2_00A4CB22 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE6B26 | 0_2_00AE6B26 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A90B22 | 0_2_00A90B22 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC4B3B | 0_2_00AC4B3B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B06B17 | 0_2_00B06B17 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD6B07 | 0_2_00AD6B07 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A56B08 | 0_2_00A56B08 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4CB11 | 0_2_00A4CB11 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AECB6D | 0_2_00AECB6D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B60B7D | 0_2_00B60B7D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B48B78 | 0_2_00B48B78 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B14B7F | 0_2_00B14B7F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B50B66 | 0_2_00B50B66 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A3CB40 | 0_2_00A3CB40 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFAB44 | 0_2_00AFAB44 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7CB5C | 0_2_00B7CB5C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A46B50 | 0_2_00A46B50 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A5ECA0 | 0_2_00A5ECA0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B38CB9 | 0_2_00B38CB9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2CCBD | 0_2_00B2CCBD |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2AC94 | 0_2_00B2AC94 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1CC81 | 0_2_00B1CC81 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4AC90 | 0_2_00A4AC90 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC2C90 | 0_2_00AC2C90 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B34C8F | 0_2_00B34C8F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADECE6 | 0_2_00ADECE6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A2ACF0 | 0_2_00A2ACF0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B62CE4 | 0_2_00B62CE4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFECFB | 0_2_00AFECFB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8ECF0 | 0_2_00A8ECF0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8AC2E | 0_2_00A8AC2E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A88C22 | 0_2_00A88C22 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AACC21 | 0_2_00AACC21 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEEC25 | 0_2_00AEEC25 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAAC24 | 0_2_00AAAC24 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B52C23 | 0_2_00B52C23 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB4C09 | 0_2_00AB4C09 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE8C05 | 0_2_00AE8C05 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACAC1C | 0_2_00ACAC1C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B04C00 | 0_2_00B04C00 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3EC0B | 0_2_00B3EC0B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABEC12 | 0_2_00ABEC12 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A24C60 | 0_2_00A24C60 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B30C7C | 0_2_00B30C7C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9EC7E | 0_2_00A9EC7E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA0C75 | 0_2_00AA0C75 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B58C5E | 0_2_00B58C5E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AACDAF | 0_2_00AACDAF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0EDBF | 0_2_00B0EDBF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B52D93 | 0_2_00B52D93 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAED87 | 0_2_00AAED87 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABAD9B | 0_2_00ABAD9B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC0D9C | 0_2_00AC0D9C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B22D8A | 0_2_00B22D8A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD8DFF | 0_2_00AD8DFF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8CDFD | 0_2_00A8CDFD |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B36DD8 | 0_2_00B36DD8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACEDC0 | 0_2_00ACEDC0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B04DCB | 0_2_00B04DCB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B20DCF | 0_2_00B20DCF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B26D30 | 0_2_00B26D30 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1ED34 | 0_2_00B1ED34 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1AD29 | 0_2_00B1AD29 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B46D17 | 0_2_00B46D17 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE4D09 | 0_2_00AE4D09 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BE6D16 | 0_2_00BE6D16 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA6D11 | 0_2_00AA6D11 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2ED09 | 0_2_00B2ED09 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BDCD66 | 0_2_00BDCD66 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB0D70 | 0_2_00AB0D70 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADCD4F | 0_2_00ADCD4F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A2CD46 | 0_2_00A2CD46 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B66D53 | 0_2_00B66D53 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A92D55 | 0_2_00A92D55 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC4EAE | 0_2_00AC4EAE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B06EB4 | 0_2_00B06EB4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB6EB4 | 0_2_00AB6EB4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5CE91 | 0_2_00B5CE91 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B08E85 | 0_2_00B08E85 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B56E8C | 0_2_00B56E8C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B60EFE | 0_2_00B60EFE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACCEF4 | 0_2_00ACCEF4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B66ED4 | 0_2_00B66ED4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A5AEC0 | 0_2_00A5AEC0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9CECF | 0_2_00A9CECF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA8ECD | 0_2_00AA8ECD |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A84EC6 | 0_2_00A84EC6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B40EC3 | 0_2_00B40EC3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE0ED5 | 0_2_00AE0ED5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF4E29 | 0_2_00AF4E29 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4AE3F | 0_2_00B4AE3F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB2E31 | 0_2_00AB2E31 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA4E02 | 0_2_00AA4E02 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A94E04 | 0_2_00A94E04 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B54E04 | 0_2_00B54E04 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF8E15 | 0_2_00AF8E15 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABEE6E | 0_2_00ABEE6E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A56E74 | 0_2_00A56E74 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4CE4D | 0_2_00B4CE4D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6EFBB | 0_2_00B6EFBB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A5EFB0 | 0_2_00A5EFB0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC6FBB | 0_2_00AC6FBB |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF4FB4 | 0_2_00AF4FB4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5EF99 | 0_2_00B5EF99 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC8F9D | 0_2_00AC8F9D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B34F84 | 0_2_00B34F84 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA2F92 | 0_2_00AA2F92 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B18FF6 | 0_2_00B18FF6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3CFC7 | 0_2_00B3CFC7 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B12F32 | 0_2_00B12F32 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEAF3E | 0_2_00AEAF3E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFCF1F | 0_2_00AFCF1F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7AF04 | 0_2_00B7AF04 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A4CF74 | 0_2_00A4CF74 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3EF6C | 0_2_00B3EF6C |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A80F4B | 0_2_00A80F4B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF8F49 | 0_2_00AF8F49 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B72F5E | 0_2_00B72F5E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A86F58 | 0_2_00A86F58 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A22F50 | 0_2_00A22F50 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A40F50 | 0_2_00A40F50 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A58F59 | 0_2_00A58F59 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8D0A3 | 0_2_00A8D0A3 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AFF0B6 | 0_2_00AFF0B6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A930E9 | 0_2_00A930E9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2D0F2 | 0_2_00B2D0F2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1F0F9 | 0_2_00B1F0F9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B050FA | 0_2_00B050FA |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3B0FC | 0_2_00B3B0FC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B370E5 | 0_2_00B370E5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B010E8 | 0_2_00B010E8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B590EA | 0_2_00B590EA |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAF0CC | 0_2_00AAF0CC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B250D9 | 0_2_00B250D9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A830C5 | 0_2_00A830C5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B49031 | 0_2_00B49031 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A91021 | 0_2_00A91021 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9B027 | 0_2_00A9B027 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6D039 | 0_2_00B6D039 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0D022 | 0_2_00B0D022 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD100A | 0_2_00AD100A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B33014 | 0_2_00B33014 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3907A | 0_2_00B3907A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B1507B | 0_2_00B1507B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAB072 | 0_2_00AAB072 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4F05D | 0_2_00B4F05D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B65044 | 0_2_00B65044 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD3056 | 0_2_00AD3056 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA7054 | 0_2_00AA7054 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF31AE | 0_2_00AF31AE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A291B0 | 0_2_00A291B0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B6B1A4 | 0_2_00B6B1A4 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0F1A8 | 0_2_00B0F1A8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AD9192 | 0_2_00AD9192 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B611F5 | 0_2_00B611F5 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A851F8 | 0_2_00A851F8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AF71FE | 0_2_00AF71FE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A431C2 | 0_2_00A431C2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B251C6 | 0_2_00B251C6 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B531C1 | 0_2_00B531C1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A5B1D0 | 0_2_00A5B1D0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8B1DD | 0_2_00A8B1DD |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A491DD | 0_2_00A491DD |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE5125 | 0_2_00AE5125 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B77122 | 0_2_00B77122 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B7512D | 0_2_00B7512D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA1101 | 0_2_00AA1101 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B43118 | 0_2_00B43118 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE711E | 0_2_00AE711E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8F16A | 0_2_00A8F16A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9914A | 0_2_00A9914A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B55156 | 0_2_00B55156 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADF149 | 0_2_00ADF149 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B41143 | 0_2_00B41143 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ADD156 | 0_2_00ADD156 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B03290 | 0_2_00B03290 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AEF287 | 0_2_00AEF287 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A99299 | 0_2_00A99299 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B77285 | 0_2_00B77285 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA929E | 0_2_00AA929E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB329D | 0_2_00AB329D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC5292 | 0_2_00AC5292 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A3B2E0 | 0_2_00A3B2E0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B232E8 | 0_2_00B232E8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B752DC | 0_2_00B752DC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A452DD | 0_2_00A452DD |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A35220 | 0_2_00A35220 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AED227 | 0_2_00AED227 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5D227 | 0_2_00B5D227 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABD23D | 0_2_00ABD23D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AC3235 | 0_2_00AC3235 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9520A | 0_2_00A9520A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B09216 | 0_2_00B09216 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3921A | 0_2_00B3921A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABB201 | 0_2_00ABB201 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00BE5207 | 0_2_00BE5207 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ACF26A | 0_2_00ACF26A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2D27D | 0_2_00B2D27D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AB924E | 0_2_00AB924E |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AAB3A2 | 0_2_00AAB3A2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B5B3BF | 0_2_00B5B3BF |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE33A2 | 0_2_00AE33A2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A773A8 | 0_2_00A773A8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A913BD | 0_2_00A913BD |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9B3B2 | 0_2_00A9B3B2 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B713A9 | 0_2_00B713A9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A97384 | 0_2_00A97384 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A9D391 | 0_2_00A9D391 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B3538B | 0_2_00B3538B |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B17388 | 0_2_00B17388 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AA73E9 | 0_2_00AA73E9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AE53F1 | 0_2_00AE53F1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B573DE | 0_2_00B573DE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B2B3DC | 0_2_00B2B3DC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00AED3D9 | 0_2_00AED3D9 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A45327 | 0_2_00A45327 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4533F | 0_2_00B4533F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A5F330 | 0_2_00A5F330 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A81375 | 0_2_00A81375 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A5D34D | 0_2_00A5D34D |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0935A | 0_2_00B0935A |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8D4AE | 0_2_00A8D4AE |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B0F4A1 | 0_2_00B0F4A1 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B4B4AC | 0_2_00B4B4AC |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00ABB48F | 0_2_00ABB48F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A3148F | 0_2_00A3148F |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00B434F0 | 0_2_00B434F0 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | Code function: 0_2_00A8F4F8 | 0_2_00A8F4F8 |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF0D89 second address: BF0D9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push edi 0x0000000a jmp 00007FA4D56AF2CAh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF0D9F second address: BF0DBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA4D4DAA654h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BEFF7D second address: BEFF81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF02A3 second address: BF02A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF045B second address: BF047F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FA4D56AF2D7h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF05BE second address: BF05D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA652h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF05D8 second address: BF05E2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA4D56AF2C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF3F9F second address: BF3FA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF3FA3 second address: BF3FE4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jp 00007FA4D56AF2C6h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f mov si, ax 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push esi 0x00000017 call 00007FA4D56AF2C8h 0x0000001c pop esi 0x0000001d mov dword ptr [esp+04h], esi 0x00000021 add dword ptr [esp+04h], 00000019h 0x00000029 inc esi 0x0000002a push esi 0x0000002b ret 0x0000002c pop esi 0x0000002d ret 0x0000002e xor ch, FFFFFF95h 0x00000031 push 7FF14AF2h 0x00000036 pushad 0x00000037 pushad 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF3FE4 second address: BF4060 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA64Ah 0x00000009 popad 0x0000000a jmp 00007FA4D4DAA64Eh 0x0000000f popad 0x00000010 xor dword ptr [esp], 7FF14A72h 0x00000017 mov dx, si 0x0000001a push 00000003h 0x0000001c stc 0x0000001d push 00000000h 0x0000001f push 00000000h 0x00000021 push edx 0x00000022 call 00007FA4D4DAA648h 0x00000027 pop edx 0x00000028 mov dword ptr [esp+04h], edx 0x0000002c add dword ptr [esp+04h], 00000015h 0x00000034 inc edx 0x00000035 push edx 0x00000036 ret 0x00000037 pop edx 0x00000038 ret 0x00000039 push 00000003h 0x0000003b push 00000000h 0x0000003d push edi 0x0000003e call 00007FA4D4DAA648h 0x00000043 pop edi 0x00000044 mov dword ptr [esp+04h], edi 0x00000048 add dword ptr [esp+04h], 00000019h 0x00000050 inc edi 0x00000051 push edi 0x00000052 ret 0x00000053 pop edi 0x00000054 ret 0x00000055 push EBA9C8F3h 0x0000005a pushad 0x0000005b pushad 0x0000005c push eax 0x0000005d pop eax 0x0000005e push ecx 0x0000005f pop ecx 0x00000060 popad 0x00000061 pushad 0x00000062 push eax 0x00000063 push edx 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4060 second address: BF40C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 popad 0x00000008 xor dword ptr [esp], 2BA9C8F3h 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007FA4D56AF2C8h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 0000001Ch 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 mov edi, dword ptr [ebp+122D2B29h] 0x0000002f lea ebx, dword ptr [ebp+1244FE69h] 0x00000035 mov dword ptr [ebp+122D1E63h], ecx 0x0000003b or ecx, 16BB2341h 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007FA4D56AF2D6h 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF40C4 second address: BF40CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4156 second address: BF4192 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007FA4D56AF2D4h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jmp 00007FA4D56AF2CCh 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FA4D56AF2CDh 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4192 second address: BF4271 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA651h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b jmp 00007FA4D4DAA653h 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 pushad 0x00000015 ja 00007FA4D4DAA651h 0x0000001b pushad 0x0000001c jmp 00007FA4D4DAA64Fh 0x00000021 jne 00007FA4D4DAA646h 0x00000027 popad 0x00000028 popad 0x00000029 pop eax 0x0000002a sub ecx, 0467A762h 0x00000030 mov ecx, dword ptr [ebp+122D2A8Dh] 0x00000036 push 00000003h 0x00000038 push 00000000h 0x0000003a push ebp 0x0000003b call 00007FA4D4DAA648h 0x00000040 pop ebp 0x00000041 mov dword ptr [esp+04h], ebp 0x00000045 add dword ptr [esp+04h], 0000001Dh 0x0000004d inc ebp 0x0000004e push ebp 0x0000004f ret 0x00000050 pop ebp 0x00000051 ret 0x00000052 mov dword ptr [ebp+122D24E7h], ebx 0x00000058 call 00007FA4D4DAA650h 0x0000005d mov dword ptr [ebp+122D27A4h], eax 0x00000063 pop ecx 0x00000064 push 00000000h 0x00000066 jp 00007FA4D4DAA64Ch 0x0000006c mov esi, dword ptr [ebp+122D182Eh] 0x00000072 push 00000003h 0x00000074 call 00007FA4D4DAA650h 0x00000079 sub dword ptr [ebp+122D34EAh], edi 0x0000007f pop edx 0x00000080 call 00007FA4D4DAA649h 0x00000085 push eax 0x00000086 push edx 0x00000087 push eax 0x00000088 push edx 0x00000089 pushad 0x0000008a popad 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4271 second address: BF428A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF428A second address: BF42A4 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA4D4DAA64Ch 0x00000008 jns 00007FA4D4DAA646h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jg 00007FA4D4DAA646h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF42A4 second address: BF42B3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF42B3 second address: BF42C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a pushad 0x0000000b jo 00007FA4D4DAA648h 0x00000011 push eax 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF42C9 second address: BF42CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF42CF second address: BF430D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 jne 00007FA4D4DAA659h 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 pushad 0x00000013 push eax 0x00000014 jmp 00007FA4D4DAA64Eh 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c jo 00007FA4D4DAA646h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF43D0 second address: BF4427 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FA4D56AF2C8h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 00000014h 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 and edx, dword ptr [ebp+122D2A9Dh] 0x0000002c add dx, 8CFEh 0x00000031 push 00000000h 0x00000033 mov dword ptr [ebp+122D1E88h], edi 0x00000039 push FBF04BBFh 0x0000003e push eax 0x0000003f push edx 0x00000040 ja 00007FA4D56AF2C8h 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4427 second address: BF4431 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FA4D4DAA646h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4431 second address: BF4469 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add dword ptr [esp], 040FB4C1h 0x0000000f add dword ptr [ebp+122D1E63h], ecx 0x00000015 push 00000003h 0x00000017 mov esi, dword ptr [ebp+122D2961h] 0x0000001d push 00000000h 0x0000001f sub dword ptr [ebp+122D1B9Ah], esi 0x00000025 push 00000003h 0x00000027 mov edx, dword ptr [ebp+122D1E88h] 0x0000002d push F8B478F1h 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4469 second address: BF446D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF446D second address: BF4473 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF4473 second address: BF44CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA657h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 38B478F1h 0x00000010 push 00000000h 0x00000012 push edx 0x00000013 call 00007FA4D4DAA648h 0x00000018 pop edx 0x00000019 mov dword ptr [esp+04h], edx 0x0000001d add dword ptr [esp+04h], 00000016h 0x00000025 inc edx 0x00000026 push edx 0x00000027 ret 0x00000028 pop edx 0x00000029 ret 0x0000002a mov dword ptr [ebp+122D1E15h], edx 0x00000030 lea ebx, dword ptr [ebp+1244FE7Dh] 0x00000036 mov edi, 6B63F872h 0x0000003b push eax 0x0000003c pushad 0x0000003d push eax 0x0000003e push edx 0x0000003f pushad 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BF44CA second address: BF44CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C12E70 second address: C12E85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA64Fh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C12E85 second address: C12E9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007FA4D56AF2CCh 0x0000000b popad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C12E9E second address: C12EA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C13003 second address: C13022 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FA4D56AF2C6h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push esi 0x0000000f pop esi 0x00000010 jnc 00007FA4D56AF2C6h 0x00000016 popad 0x00000017 jbe 00007FA4D56AF2CEh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C136FD second address: C13709 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C13709 second address: C1372C instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007FA4D56AF2C6h 0x00000012 jmp 00007FA4D56AF2D1h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C07500 second address: C07506 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C07506 second address: C0750A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C0750A second address: C07518 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA4D4DAA646h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C143EF second address: C143F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C143F6 second address: C14400 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA4D4DAA652h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C14400 second address: C1440E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FA4D56AF2C6h 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C1440E second address: C14412 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C14412 second address: C14416 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C14416 second address: C1441C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C146D2 second address: C146D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C146D7 second address: C146DC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C1481A second address: C14821 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C14ADC second address: C14AED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA64Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDFEBB second address: BDFEC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDFEC1 second address: BDFEE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007FA4D4DAA648h 0x0000000e jmp 00007FA4D4DAA652h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDFEE3 second address: BDFEE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDFEE9 second address: BDFEF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FA4D4DAA646h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDFEF3 second address: BDFF03 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 js 00007FA4D56AF2C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDFF03 second address: BDFF07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDFF07 second address: BDFF0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C18E3B second address: C18E47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FA4D4DAA646h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C1C1DA second address: C1C1E0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C1C410 second address: C1C414 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C1C414 second address: C1C418 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C209EB second address: C209FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA650h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C209FF second address: C20A27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007FA4D56AF2C6h 0x0000000d jmp 00007FA4D56AF2D4h 0x00000012 jns 00007FA4D56AF2C6h 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C20043 second address: C20047 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C20047 second address: C20055 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C20055 second address: C20059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C20059 second address: C2005D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C2005D second address: C20063 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C20607 second address: C20614 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C23E3B second address: C23E4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA64Fh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C23FEB second address: C23FF5 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C23FF5 second address: C24028 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4D4DAA655h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA4D4DAA651h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C24028 second address: C2403E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C24AD2 second address: C24AD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C24E80 second address: C24E9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D56AF2D7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C25002 second address: C25008 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C25008 second address: C2500C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C2500C second address: C2503D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA654h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f jmp 00007FA4D4DAA652h 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C2503D second address: C25047 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4D56AF2CCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C2549D second address: C254D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA657h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA4D4DAA655h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C254D0 second address: C25563 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 add dword ptr [ebp+122D1BC3h], ebx 0x0000000f jmp 00007FA4D56AF2CDh 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push edi 0x00000019 call 00007FA4D56AF2C8h 0x0000001e pop edi 0x0000001f mov dword ptr [esp+04h], edi 0x00000023 add dword ptr [esp+04h], 0000001Ch 0x0000002b inc edi 0x0000002c push edi 0x0000002d ret 0x0000002e pop edi 0x0000002f ret 0x00000030 push edi 0x00000031 add esi, 13A2E088h 0x00000037 pop edi 0x00000038 movsx esi, ax 0x0000003b jc 00007FA4D56AF2CCh 0x00000041 mov dword ptr [ebp+122D1BCEh], esi 0x00000047 push 00000000h 0x00000049 push 00000000h 0x0000004b push edi 0x0000004c call 00007FA4D56AF2C8h 0x00000051 pop edi 0x00000052 mov dword ptr [esp+04h], edi 0x00000056 add dword ptr [esp+04h], 00000018h 0x0000005e inc edi 0x0000005f push edi 0x00000060 ret 0x00000061 pop edi 0x00000062 ret 0x00000063 mov dword ptr [ebp+122D1C3Dh], ebx 0x00000069 xchg eax, ebx 0x0000006a push eax 0x0000006b push edx 0x0000006c jmp 00007FA4D56AF2CFh 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C25E4D second address: C25EBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 mov dword ptr [esp], eax 0x00000009 jmp 00007FA4D4DAA653h 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push ecx 0x00000013 call 00007FA4D4DAA648h 0x00000018 pop ecx 0x00000019 mov dword ptr [esp+04h], ecx 0x0000001d add dword ptr [esp+04h], 00000018h 0x00000025 inc ecx 0x00000026 push ecx 0x00000027 ret 0x00000028 pop ecx 0x00000029 ret 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push ebx 0x0000002f call 00007FA4D4DAA648h 0x00000034 pop ebx 0x00000035 mov dword ptr [esp+04h], ebx 0x00000039 add dword ptr [esp+04h], 00000014h 0x00000041 inc ebx 0x00000042 push ebx 0x00000043 ret 0x00000044 pop ebx 0x00000045 ret 0x00000046 push edi 0x00000047 xor dword ptr [ebp+122D1DC5h], esi 0x0000004d pop esi 0x0000004e push eax 0x0000004f jg 00007FA4D4DAA654h 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C25EBC second address: C25EC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C26E82 second address: C26EE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jg 00007FA4D4DAA648h 0x0000000b popad 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007FA4D4DAA648h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 0000001Ch 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 jmp 00007FA4D4DAA655h 0x0000002c mov si, di 0x0000002f push 00000000h 0x00000031 mov esi, dword ptr [ebp+122D27DDh] 0x00000037 push 00000000h 0x00000039 mov di, 24E4h 0x0000003d mov dword ptr [ebp+122D2507h], eax 0x00000043 push eax 0x00000044 pushad 0x00000045 pushad 0x00000046 push eax 0x00000047 push edx 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C279FB second address: C27A01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C27A01 second address: C27A06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C27A06 second address: C27A18 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push edx 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push edi 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C27A18 second address: C27A1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C27A1D second address: C27A22 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C28266 second address: C2826A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C28E9A second address: C28F30 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FA4D56AF2D0h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e jns 00007FA4D56AF2DFh 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push edx 0x00000019 call 00007FA4D56AF2C8h 0x0000001e pop edx 0x0000001f mov dword ptr [esp+04h], edx 0x00000023 add dword ptr [esp+04h], 00000014h 0x0000002b inc edx 0x0000002c push edx 0x0000002d ret 0x0000002e pop edx 0x0000002f ret 0x00000030 call 00007FA4D56AF2D0h 0x00000035 or edi, dword ptr [ebp+122D2C47h] 0x0000003b pop esi 0x0000003c or dword ptr [ebp+122D19FAh], edi 0x00000042 push 00000000h 0x00000044 xor dword ptr [ebp+122D2ED7h], edx 0x0000004a add dword ptr [ebp+122D1B58h], edx 0x00000050 xchg eax, ebx 0x00000051 push edx 0x00000052 jnl 00007FA4D56AF2C8h 0x00000058 pop edx 0x00000059 push eax 0x0000005a push edi 0x0000005b push eax 0x0000005c push edx 0x0000005d jno 00007FA4D56AF2C6h 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C28F30 second address: C28F34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C2C045 second address: C2C04F instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4D56AF2C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C316F6 second address: C316FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C316FC second address: C31700 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C31700 second address: C3170F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c push eax 0x0000000d pop eax 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3378C second address: C33790 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C33790 second address: C337A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jno 00007FA4D4DAA646h 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3181C second address: C31830 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D56AF2D0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C337A0 second address: C337B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4D4DAA651h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C31830 second address: C31834 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C337B8 second address: C337E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FA4D4DAA652h 0x0000000b jmp 00007FA4D4DAA651h 0x00000010 jne 00007FA4D4DAA646h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C337E9 second address: C337F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C31834 second address: C318C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov dword ptr [ebp+122D1CA7h], edx 0x00000011 push dword ptr fs:[00000000h] 0x00000018 call 00007FA4D4DAA64Ch 0x0000001d and ebx, dword ptr [ebp+122D1BC9h] 0x00000023 pop edi 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b pushad 0x0000002c mov edi, 7BDFDBBEh 0x00000031 call 00007FA4D4DAA64Ah 0x00000036 mov edi, dword ptr [ebp+122D29E5h] 0x0000003c pop edx 0x0000003d popad 0x0000003e mov eax, dword ptr [ebp+122D134Dh] 0x00000044 mov di, B1C7h 0x00000048 push FFFFFFFFh 0x0000004a push 00000000h 0x0000004c push edx 0x0000004d call 00007FA4D4DAA648h 0x00000052 pop edx 0x00000053 mov dword ptr [esp+04h], edx 0x00000057 add dword ptr [esp+04h], 00000019h 0x0000005f inc edx 0x00000060 push edx 0x00000061 ret 0x00000062 pop edx 0x00000063 ret 0x00000064 mov edi, dword ptr [ebp+122D2ACDh] 0x0000006a push eax 0x0000006b pushad 0x0000006c jne 00007FA4D4DAA64Ch 0x00000072 push eax 0x00000073 push edx 0x00000074 pushad 0x00000075 popad 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C34E22 second address: C34E2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C34109 second address: C3410E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3410E second address: C3412B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D56AF2D9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C341DF second address: C34208 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA658h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jc 00007FA4D4DAA648h 0x00000011 push edx 0x00000012 pop edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C34F2C second address: C34F4D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA4D56AF2D4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C35016 second address: C3501C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C36147 second address: C3616C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007FA4D56AF2C8h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C38DB1 second address: C38DB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C39CD3 second address: C39CD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C39CD7 second address: C39CDD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C39CDD second address: C39CE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C39CE3 second address: C39CE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3ACDC second address: C3ACE9 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3ACE9 second address: C3AD05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA64Fh 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3AD05 second address: C3AD14 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BE9F46 second address: BE9F5F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA64Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push edi 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3AF05 second address: C3AF0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3D4D1 second address: C3D4F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA4D4DAA653h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3D4F0 second address: C3D4FA instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3E48B second address: C3E4AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA652h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jbe 00007FA4D4DAA654h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C401E6 second address: C401EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C401EA second address: C40203 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FA4D4DAA64Ch 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3E4AC second address: C3E53C instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov ebx, 7B79D4B3h 0x00000010 push dword ptr fs:[00000000h] 0x00000017 pushad 0x00000018 jns 00007FA4D56AF2CCh 0x0000001e sbb di, 09E2h 0x00000023 popad 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b adc ebx, 617140E2h 0x00000031 mov edi, dword ptr [ebp+1244C684h] 0x00000037 mov eax, dword ptr [ebp+122D0741h] 0x0000003d mov dword ptr [ebp+122D1A3Dh], eax 0x00000043 push FFFFFFFFh 0x00000045 push 00000000h 0x00000047 push edx 0x00000048 call 00007FA4D56AF2C8h 0x0000004d pop edx 0x0000004e mov dword ptr [esp+04h], edx 0x00000052 add dword ptr [esp+04h], 00000019h 0x0000005a inc edx 0x0000005b push edx 0x0000005c ret 0x0000005d pop edx 0x0000005e ret 0x0000005f mov dword ptr [ebp+1244C062h], eax 0x00000065 push eax 0x00000066 js 00007FA4D56AF2E7h 0x0000006c push eax 0x0000006d push edx 0x0000006e jmp 00007FA4D56AF2D5h 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C40203 second address: C40208 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3E53C second address: C3E540 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C40208 second address: C4024E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jng 00007FA4D4DAA646h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007FA4D4DAA648h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 00000014h 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 add bx, 81C2h 0x0000002c mov edi, dword ptr [ebp+124506FDh] 0x00000032 push 00000000h 0x00000034 movsx ebx, di 0x00000037 push 00000000h 0x00000039 mov dword ptr [ebp+122D1FEEh], edx 0x0000003f push eax 0x00000040 push ebx 0x00000041 pushad 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3F524 second address: C3F53C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FA4D56AF2C6h 0x00000009 jne 00007FA4D56AF2C6h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C3F53C second address: C3F541 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C427CA second address: C427D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C43AC9 second address: C43AD8 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA4D4DAA646h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C49605 second address: C49626 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA4D56AF2C6h 0x00000008 jmp 00007FA4D56AF2D7h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C49626 second address: C4962B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C4CF74 second address: C4CF78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C4CF78 second address: C4CFA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push edi 0x0000000a jmp 00007FA4D4DAA64Fh 0x0000000f pop edi 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FA4D4DAA650h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C4D223 second address: C4D228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C4D228 second address: C4D22E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C52EFB second address: C52EFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C52EFF second address: C52F0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA64Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C52F0F second address: C52F14 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C53755 second address: C5375B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5375B second address: C53761 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C53761 second address: C537A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA4D4DAA646h 0x0000000a popad 0x0000000b jno 00007FA4D4DAA65Fh 0x00000011 jmp 00007FA4D4DAA653h 0x00000016 popad 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push esi 0x0000001b pop esi 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C53CB3 second address: C53CCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jns 00007FA4D56AF2D2h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C53CCC second address: C53CE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D4DAA656h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C53CE8 second address: C53CEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C53CEC second address: C53D12 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA4D4DAA646h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FA4D4DAA656h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BE191E second address: BE1923 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58618 second address: C58630 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA654h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58788 second address: C5878E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5878E second address: C58794 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5895B second address: C5895F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58BAD second address: C58BBA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jp 00007FA4D4DAA646h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58BBA second address: C58BC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58D2A second address: C58D37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58D37 second address: C58D44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 js 00007FA4D56AF2CCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58D44 second address: C58D48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58D48 second address: C58D52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C58D52 second address: C58D56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5903F second address: C59046 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C59046 second address: C5904F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5904F second address: C59071 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C59071 second address: C5907E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jbe 00007FA4D4DAA648h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5907E second address: C59083 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C59311 second address: C59329 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D4DAA64Eh 0x00000009 jl 00007FA4D4DAA646h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C59329 second address: C5932F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5932F second address: C59343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FA4D4DAA64Bh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5CDD0 second address: C5CDD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C227B0 second address: C227E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA653h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a mov dword ptr [esp], eax 0x0000000d jp 00007FA4D4DAA649h 0x00000013 mov ecx, edi 0x00000015 lea eax, dword ptr [ebp+1247E529h] 0x0000001b push eax 0x0000001c push ecx 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C227E1 second address: C07500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop ecx 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007FA4D56AF2C8h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 0000001Bh 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 xor cl, FFFFFFB6h 0x00000026 call dword ptr [ebp+122D27AAh] 0x0000002c pushad 0x0000002d push ebx 0x0000002e push edx 0x0000002f pop edx 0x00000030 pop ebx 0x00000031 pushad 0x00000032 jbe 00007FA4D56AF2C6h 0x00000038 jmp 00007FA4D56AF2D4h 0x0000003d jmp 00007FA4D56AF2D9h 0x00000042 popad 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 push edx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C22E90 second address: C22E94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C22F8E second address: C22F9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C23661 second address: C23665 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C2373E second address: C23745 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C23908 second address: C23934 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a or dword ptr [ebp+122D1AF7h], edx 0x00000010 lea eax, dword ptr [ebp+1247E56Dh] 0x00000016 nop 0x00000017 pushad 0x00000018 js 00007FA4D4DAA648h 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FA4D4DAA64Ah 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C23934 second address: C23956 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C23956 second address: C2395A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C080BD second address: C080C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C080C4 second address: C080DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jno 00007FA4D4DAA646h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e jl 00007FA4D4DAA652h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C080DA second address: C080E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D0FC second address: C5D114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jg 00007FA4D4DAA646h 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 pop edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D114 second address: C5D11A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D265 second address: C5D2B7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA4D4DAA646h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007FA4D4DAA656h 0x00000010 jmp 00007FA4D4DAA64Ah 0x00000015 jno 00007FA4D4DAA646h 0x0000001b jmp 00007FA4D4DAA657h 0x00000020 popad 0x00000021 jo 00007FA4D4DAA697h 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FA4D4DAA652h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D2B7 second address: C5D2C1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA4D56AF2C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D885 second address: C5D889 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D889 second address: C5D88F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D88F second address: C5D89B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D9E6 second address: C5D9EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C5D9EC second address: C5D9F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C60FB3 second address: C60FCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA4D56AF2CBh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007FA4D56AF2C6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C60FCD second address: C60FD3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BE8447 second address: BE847E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D8h 0x00000007 jmp 00007FA4D56AF2D1h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jg 00007FA4D56AF2C6h 0x00000016 push edx 0x00000017 pop edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C66C82 second address: C66C8E instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA4D4DAA64Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C658AD second address: C658C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push esi 0x00000006 jmp 00007FA4D56AF2D1h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C658C8 second address: C658E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA654h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65A5F second address: C65A77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FA4D56AF2C6h 0x0000000a jmp 00007FA4D56AF2CAh 0x0000000f popad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65A77 second address: C65A8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA64Fh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65D32 second address: C65D37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65D37 second address: C65D3C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65EC1 second address: C65EC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65EC8 second address: C65ED4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FA4D4DAA646h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65ED4 second address: C65ED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65ED8 second address: C65F07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA650h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jo 00007FA4D4DAA65Dh 0x00000011 jmp 00007FA4D4DAA651h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C661B2 second address: C661E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 pop esi 0x0000000a pushad 0x0000000b jmp 00007FA4D56AF2D3h 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FA4D56AF2D2h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C661E6 second address: C66203 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA4D4DAA655h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C66375 second address: C663A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D56AF2D1h 0x00000009 push edx 0x0000000a pop edx 0x0000000b jmp 00007FA4D56AF2D5h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C663A2 second address: C663AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FA4D4DAA646h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C66545 second address: C6654F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA4D56AF2C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C666C6 second address: C666EF instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA4D4DAA646h 0x00000008 jg 00007FA4D4DAA646h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA4D4DAA657h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C666EF second address: C666F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C666F7 second address: C66729 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 js 00007FA4D4DAA646h 0x00000009 jmp 00007FA4D4DAA64Ah 0x0000000e pop ecx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jmp 00007FA4D4DAA64Fh 0x00000017 push ecx 0x00000018 push edx 0x00000019 pop edx 0x0000001a pop ecx 0x0000001b push eax 0x0000001c push edx 0x0000001d je 00007FA4D4DAA646h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65257 second address: C65289 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FA4D56AF2D1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jng 00007FA4D56AF2D3h 0x00000011 jnp 00007FA4D56AF2CEh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C65289 second address: C652BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push edi 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jbe 00007FA4D4DAA646h 0x0000000f pop edi 0x00000010 popad 0x00000011 pushad 0x00000012 push ebx 0x00000013 je 00007FA4D4DAA646h 0x00000019 pop ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FA4D4DAA656h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6E768 second address: C6E76E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6E76E second address: C6E774 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6E898 second address: C6E8BA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FA4D56AF2D8h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6E8BA second address: C6E8BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6E9F3 second address: C6EA1B instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA4D56AF2C6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA4D56AF2D8h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6EA1B second address: C6EA1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6EA1F second address: C6EA39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2D6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6EA39 second address: C6EA3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6EA3E second address: C6EA58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA4D56AF2CBh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6EA58 second address: C6EA62 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA4D4DAA646h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C6EA62 second address: C6EA80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2CDh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA4D56AF2CDh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BDC8E9 second address: BDC8ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C70F41 second address: C70F46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C77EAE second address: C77EB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C77EB4 second address: C77EB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C77EB8 second address: C77ED4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA658h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7807D second address: C78083 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C78259 second address: C7825F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C783BA second address: C783C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C784EF second address: C784F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C784F5 second address: C784F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C784F9 second address: C784FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C784FD second address: C78509 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C78509 second address: C78539 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA653h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FA4D4DAA655h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C786BA second address: C786BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C786BE second address: C786C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C786C2 second address: C786CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C22D3C second address: C22D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 xor dword ptr [esp], 5EDD645Bh 0x0000000b push 00000000h 0x0000000d push ecx 0x0000000e call 00007FA4D4DAA648h 0x00000013 pop ecx 0x00000014 mov dword ptr [esp+04h], ecx 0x00000018 add dword ptr [esp+04h], 00000019h 0x00000020 inc ecx 0x00000021 push ecx 0x00000022 ret 0x00000023 pop ecx 0x00000024 ret 0x00000025 push 0D0E0F39h 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FA4D4DAA657h 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C234A1 second address: C234B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 pushad 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C234B1 second address: C234DB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 cmc 0x00000009 mov edi, dword ptr [ebp+122D2D5Eh] 0x0000000f push 00000004h 0x00000011 adc di, 790Fh 0x00000016 movsx edx, ax 0x00000019 nop 0x0000001a push edx 0x0000001b push edi 0x0000001c ja 00007FA4D4DAA646h 0x00000022 pop edi 0x00000023 pop edx 0x00000024 push eax 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 push edx 0x00000029 pop edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C234DB second address: C234DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C789D4 second address: C789DA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C79386 second address: C7938F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7C86F second address: C7C877 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7CA21 second address: C7CA25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7CA25 second address: C7CA32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7CB83 second address: C7CB88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7CE8E second address: C7CE95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7CE95 second address: C7CE9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7CFCE second address: C7CFF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 jmp 00007FA4D4DAA658h 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007FA4D4DAA646h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7CFF5 second address: C7D00B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C7D00B second address: C7D036 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA4D4DAA646h 0x00000008 js 00007FA4D4DAA646h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FA4D4DAA658h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C80BAA second address: C80BB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007FA4D56AF2C6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C80BB8 second address: C80BBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C80BBD second address: C80BC2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C80CCF second address: C80CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C80CD3 second address: C80CE9 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA4D56AF2C6h 0x00000008 jng 00007FA4D56AF2C6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C80CE9 second address: C80CF8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA64Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C80FE4 second address: C81017 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007FA4D56AF2CEh 0x0000000e jmp 00007FA4D56AF2D7h 0x00000013 pop ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C81017 second address: C8101D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C8101D second address: C81021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C81021 second address: C81025 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C896EC second address: C896F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C896F0 second address: C896F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C87616 second address: C87633 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4D56AF2D7h 0x00000008 jmp 00007FA4D56AF2CFh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C87633 second address: C87637 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C87637 second address: C8763B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C87790 second address: C87796 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C87796 second address: C877AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 js 00007FA4D56AF2D2h 0x0000000d jc 00007FA4D56AF2C6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C877AB second address: C877AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C884C1 second address: C884C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C884C9 second address: C884D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007FA4D4DAA646h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C884D9 second address: C884F1 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007FA4D56AF2D2h 0x00000010 jne 00007FA4D56AF2C6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C884F1 second address: C884F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C88A7A second address: C88A81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C8907A second address: C890C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA657h 0x00000009 popad 0x0000000a push esi 0x0000000b jmp 00007FA4D4DAA652h 0x00000010 pushad 0x00000011 popad 0x00000012 pop esi 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FA4D4DAA658h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C890C9 second address: C890E0 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA4D56AF2C6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FA4D56AF2CBh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BE6865 second address: BE6869 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BE6869 second address: BE686F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: BE686F second address: BE6875 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C912A2 second address: C912B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D56AF2CAh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91416 second address: C9141C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C9141C second address: C91422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91422 second address: C91427 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91427 second address: C9142C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C915A5 second address: C915C3 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA4D4DAA64Ch 0x00000008 jns 00007FA4D4DAA646h 0x0000000e push esi 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push edi 0x00000012 pop edi 0x00000013 pop esi 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C915C3 second address: C915D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jno 00007FA4D56AF2C8h 0x0000000b js 00007FA4D56AF2CCh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91850 second address: C9185A instructions: 0x00000000 rdtsc 0x00000002 js 00007FA4D4DAA646h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C9185A second address: C9185F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C9185F second address: C91865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C919D8 second address: C91A05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D56AF2CBh 0x00000009 jmp 00007FA4D56AF2D5h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jbe 00007FA4D56AF2C6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91BA6 second address: C91BB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91BB7 second address: C91BBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91BBB second address: C91BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C91BC1 second address: C91BD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D56AF2D0h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98026 second address: C9802B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C9802B second address: C98031 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98031 second address: C98048 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA64Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C9819C second address: C981EE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jc 00007FA4D56AF2C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jo 00007FA4D56AF2C6h 0x00000013 jmp 00007FA4D56AF2D9h 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b popad 0x0000001c jl 00007FA4D56AF2F2h 0x00000022 jmp 00007FA4D56AF2D9h 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98514 second address: C9851A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C9851A second address: C9855F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007FA4D56AF2CDh 0x0000000a push esi 0x0000000b pop esi 0x0000000c jmp 00007FA4D56AF2D9h 0x00000011 popad 0x00000012 jmp 00007FA4D56AF2D0h 0x00000017 pop edx 0x00000018 pop eax 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C986DC second address: C986E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA4D4DAA646h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C986E6 second address: C986F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D56AF2CBh 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C989F3 second address: C98A14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA4D4DAA646h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007FA4D4DAA653h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98B7C second address: C98B9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D56AF2D9h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98B9D second address: C98BB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FA4D4DAA64Ch 0x0000000b pop esi 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f js 00007FA4D4DAA646h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98E94 second address: C98E98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98E98 second address: C98EA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jo 00007FA4D4DAA646h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98EA9 second address: C98EAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98EAE second address: C98ED4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FA4D4DAA658h 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d je 00007FA4D4DAA646h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C98ED4 second address: C98ED8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C9980A second address: C99814 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA4D4DAA646h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99814 second address: C99818 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99EBF second address: C99EC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99EC3 second address: C99ED3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jnc 00007FA4D56AF2C6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99ED3 second address: C99EE4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA64Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99EE4 second address: C99F02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D56AF2D8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99F02 second address: C99F06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99F06 second address: C99F1A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e push esi 0x0000000f pop esi 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: C99F1A second address: C99F44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA4D4DAA654h 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA4D4DAA64Dh 0x00000011 push edx 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CA0D5E second address: CA0D77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FA4D56AF2C6h 0x00000009 jmp 00007FA4D56AF2CEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CA0D77 second address: CA0D91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push esi 0x00000009 push eax 0x0000000a pop eax 0x0000000b js 00007FA4D4DAA646h 0x00000011 pop esi 0x00000012 jp 00007FA4D4DAA64Eh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CA0D91 second address: CA0DA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jno 00007FA4D56AF2C8h 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CB15B9 second address: CB15D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA4D4DAA651h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CB11D2 second address: CB11EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a jmp 00007FA4D56AF2CEh 0x0000000f pushad 0x00000010 popad 0x00000011 push edi 0x00000012 pop edi 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CB8C71 second address: CB8C75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CBB0D3 second address: CBB0E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jp 00007FA4D56AF2CEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CBB0E3 second address: CBB105 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jnc 00007FA4D4DAA64Ch 0x0000000c popad 0x0000000d pushad 0x0000000e jnc 00007FA4D4DAA64Ah 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CBB105 second address: CBB109 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CBB109 second address: CBB119 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jo 00007FA4D4DAA646h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CC0A28 second address: CC0A3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA4D56AF2D0h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCCAAB second address: CCCAC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA653h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCCC20 second address: CCCC39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007FA4D56AF2C6h 0x0000000d jmp 00007FA4D56AF2CCh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCCC39 second address: CCCC4E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA651h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCCDC4 second address: CCCDC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD067 second address: CCD06D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD06D second address: CCD071 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD071 second address: CCD075 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD20E second address: CCD220 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FA4D56AF2CBh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD220 second address: CCD237 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA651h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD4B3 second address: CCD4E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FA4D56AF2D4h 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FA4D56AF2CCh 0x00000013 push esi 0x00000014 jno 00007FA4D56AF2C6h 0x0000001a pop esi 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jng 00007FA4D56AF2CCh 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD4E0 second address: CCD4FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4D4DAA659h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCD4FD second address: CCD50F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4D56AF2CCh 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCDED1 second address: CCDED7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCDED7 second address: CCDF03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FA4D56AF2CFh 0x0000000b jmp 00007FA4D56AF2D7h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CCDF03 second address: CCDF43 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA4D4DAA646h 0x00000008 jmp 00007FA4D4DAA650h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FA4D4DAA653h 0x00000014 popad 0x00000015 pushad 0x00000016 push edx 0x00000017 jno 00007FA4D4DAA646h 0x0000001d pop edx 0x0000001e push edx 0x0000001f jne 00007FA4D4DAA646h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CD105E second address: CD1062 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CD1062 second address: CD1078 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FA4D4DAA64Ch 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CDE5D6 second address: CDE5E0 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CDE5E0 second address: CDE5E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CEC7C1 second address: CEC7C7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CF0B63 second address: CF0B7F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jmp 00007FA4D4DAA652h 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CF0702 second address: CF070C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CF21F4 second address: CF21F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: CF21F9 second address: CF21FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: D06A3E second address: D06A63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA652h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push edx 0x0000000b pop edx 0x0000000c jmp 00007FA4D4DAA64Bh 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: D06328 second address: D0632E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: D0983A second address: D09854 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4D4DAA655h 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\ddySsHnC6l.exe | RDTSC instruction interceptor: First address: D0C665 second address: D0C66F instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA4D56AF2C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |