Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h] | 1_2_0087C767 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then lea edx, dword ptr [ecx+01h] | 1_2_0084B70C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov edx, ecx | 1_2_00849C4A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebx, esi | 1_2_00862190 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [ebx], cx | 1_2_00862190 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 1_2_00862190 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh] | 1_2_00856263 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then jmp dword ptr [0088450Ch] | 1_2_00858591 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h | 1_2_008785E0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then jmp eax | 1_2_008785E0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov eax, dword ptr [0088473Ch] | 1_2_0085C653 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h] | 1_2_0085E7C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 1_2_0086A700 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebx, edx | 1_2_0084C8B6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+4B6A4A26h] | 1_2_0084C8B6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov edx, ecx | 1_2_00878810 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh | 1_2_00878810 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh | 1_2_00878810 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then test eax, eax | 1_2_00878810 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov byte ptr [edi], al | 1_2_0085682D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+18h] | 1_2_0085682D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h] | 1_2_0085682D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then push ebx | 1_2_0087CA93 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov byte ptr [edi], cl | 1_2_0086CAD0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov byte ptr [edi], cl | 1_2_0086CA49 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then cmp al, 2Eh | 1_2_00866B95 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov byte ptr [edi], cl | 1_2_0086CB11 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov byte ptr [edi], cl | 1_2_0086CB22 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [eax], cx | 1_2_0085CB40 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [esi], cx | 1_2_0085CB40 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [eax], cx | 1_2_00868B61 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h] | 1_2_0087ECA0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov eax, dword ptr [ebp-68h] | 1_2_00868D93 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ecx, eax | 1_2_0087AEC0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h] | 1_2_0087EFB0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then xor byte ptr [esp+eax+17h], al | 1_2_00848F50 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov byte ptr [edi], bl | 1_2_00848F50 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then push C0BFD6CCh | 1_2_00863086 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then push C0BFD6CCh | 1_2_00863086 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h | 1_2_0087B1D0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebx, eax | 1_2_0087B1D0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [ecx], dx | 1_2_008691DD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ecx, dword ptr [ebp-20h] | 1_2_008691DD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then add ebp, dword ptr [esp+0Ch] | 1_2_0086B170 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [ebx], ax | 1_2_0085B2E0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh] | 1_2_00855220 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh] | 1_2_00857380 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h | 1_2_0085D380 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax] | 1_2_0087F330 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [ecx], dx | 1_2_008691DD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ecx, dword ptr [ebp-20h] | 1_2_008691DD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 1_2_008474F0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 1_2_008474F0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh] | 1_2_00857380 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 1_2_00875450 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ecx, eax | 1_2_00849580 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [ebp+00h], ax | 1_2_00849580 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then xor edi, edi | 1_2_0085759F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov esi, eax | 1_2_00855799 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ecx, eax | 1_2_00855799 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx eax, word ptr [edx] | 1_2_008597C2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [edi], dx | 1_2_008597C2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [esi], cx | 1_2_008597C2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov word ptr [ecx], bp | 1_2_0085D83A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then jmp eax | 1_2_0086984F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh] | 1_2_00863860 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebx, eax | 1_2_00845990 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebp, eax | 1_2_00845990 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov eax, dword ptr [esp+00000080h] | 1_2_008579C1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then push esi | 1_2_00867AD3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov byte ptr [esi], al | 1_2_0086DA53 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebx, eax | 1_2_0084DBD9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then mov ebx, eax | 1_2_0084DBD9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 4x nop then push 00000000h | 1_2_00869C2B |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2270966924.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly. |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampow8A=O. |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.st(A |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2270966924.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274148688.0000000001483000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2270966924.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/& |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2270966924.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/85 |
Source: 6S7hoBEHvr.exe, 00000001.00000002.2274148688.0000000001483000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/a |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2270966924.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/q |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014AD000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014AE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260943595.000000000149C000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2270966924.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/api |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014AD000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014AE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2270966924.000000000149B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/apirofiles/76561199724331900l |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steamphA |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014AD000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014AE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260943595.000000000149C000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2270966924.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233395225.00000000014AD000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://rapeflowwj.lat:443/apipit |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaizedHA |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/p |
Source: 6S7hoBEHvr.exe, 00000001.00000002.2274148688.0000000001499000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/7656 |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2260943595.000000000149C000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233395225.00000000014AD000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900l |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.000000000149B000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2270966924.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptc |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233192738.0000000001510000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260863247.0000000001506000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2260914829.0000000001506000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: 6S7hoBEHvr.exe, 00000001.00000003.2233223302.00000000014FE000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000002.2274437912.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2233270963.00000000014EF000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261025319.00000000014B9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2261086151.00000000014C9000.00000004.00000020.00020000.00000000.sdmp, 6S7hoBEHvr.exe, 00000001.00000003.2271357953.00000000014B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00848850 | 1_2_00848850 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0084ACF0 | 1_2_0084ACF0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097E09A | 1_2_0097E09A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00984089 | 1_2_00984089 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A009F | 1_2_008A009F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097C0B3 | 1_2_0097C0B3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C60D8 | 1_2_009C60D8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009880DF | 1_2_009880DF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D20CD | 1_2_009D20CD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A80C3 | 1_2_009A80C3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009000F1 | 1_2_009000F1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DE0FE | 1_2_009DE0FE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008DC0E8 | 1_2_008DC0E8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008960E2 | 1_2_008960E2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009420E9 | 1_2_009420E9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098E019 | 1_2_0098E019 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008DA006 | 1_2_008DA006 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093C002 | 1_2_0093C002 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00916003 | 1_2_00916003 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00936037 | 1_2_00936037 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093A03E | 1_2_0093A03E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090C020 | 1_2_0090C020 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00994021 | 1_2_00994021 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B0021 | 1_2_009B0021 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A0054 | 1_2_009A0054 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A604A | 1_2_009A604A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F405E | 1_2_008F405E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099E045 | 1_2_0099E045 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094A07E | 1_2_0094A07E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00976061 | 1_2_00976061 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00980063 | 1_2_00980063 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097A19D | 1_2_0097A19D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096A186 | 1_2_0096A186 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A218F | 1_2_009A218F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00862190 | 1_2_00862190 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009BE1B0 | 1_2_009BE1B0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009201BC | 1_2_009201BC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009361A5 | 1_2_009361A5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F01CF | 1_2_008F01CF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AC1CF | 1_2_008AC1CF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008641C0 | 1_2_008641C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008CA1C0 | 1_2_008CA1C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B41D6 | 1_2_009B41D6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091A1C0 | 1_2_0091A1C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009141C4 | 1_2_009141C4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009861FB | 1_2_009861FB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DC1FA | 1_2_009DC1FA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B21E5 | 1_2_008B21E5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FA1FB | 1_2_008FA1FB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EE107 | 1_2_008EE107 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00982112 | 1_2_00982112 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00998107 | 1_2_00998107 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B012D | 1_2_008B012D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093013A | 1_2_0093013A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092E141 | 1_2_0092E141 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00910144 | 1_2_00910144 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D414B | 1_2_009D414B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C817F | 1_2_009C817F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096217F | 1_2_0096217F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B6160 | 1_2_008B6160 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095816D | 1_2_0095816D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00846280 | 1_2_00846280 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0085E290 | 1_2_0085E290 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DA284 | 1_2_009DA284 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091828B | 1_2_0091828B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CE286 | 1_2_009CE286 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096628B | 1_2_0096628B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AC2BC | 1_2_009AC2BC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009542BB | 1_2_009542BB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091C2A1 | 1_2_0091C2A1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009762A6 | 1_2_009762A6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090C2A3 | 1_2_0090C2A3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009262A1 | 1_2_009262A1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009082AA | 1_2_009082AA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009402A8 | 1_2_009402A8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AE2D8 | 1_2_009AE2D8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009022D4 | 1_2_009022D4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009122DF | 1_2_009122DF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E22CC | 1_2_009E22CC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F62D8 | 1_2_008F62D8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009582C2 | 1_2_009582C2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C82E5 | 1_2_008C82E5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B82E5 | 1_2_008B82E5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009682E5 | 1_2_009682E5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FC205 | 1_2_008FC205 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AA212 | 1_2_008AA212 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E4202 | 1_2_009E4202 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090A237 | 1_2_0090A237 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E0232 | 1_2_009E0232 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095A238 | 1_2_0095A238 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F423F | 1_2_008F423F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00904224 | 1_2_00904224 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093222F | 1_2_0093222F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00964247 | 1_2_00964247 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C6252 | 1_2_008C6252 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00856263 | 1_2_00856263 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092827E | 1_2_0092827E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EC260 | 1_2_008EC260 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008CC279 | 1_2_008CC279 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E8277 | 1_2_008E8277 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C2273 | 1_2_008C2273 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E439D | 1_2_009E439D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00864380 | 1_2_00864380 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095C39F | 1_2_0095C39F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00934381 | 1_2_00934381 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B03B8 | 1_2_009B03B8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009603BC | 1_2_009603BC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EA3B8 | 1_2_008EA3B8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008BC3B1 | 1_2_008BC3B1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009903A2 | 1_2_009903A2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00AA03E8 | 1_2_00AA03E8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009F43D5 | 1_2_009F43D5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E03E8 | 1_2_008E03E8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009043F8 | 1_2_009043F8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AE3FA | 1_2_008AE3FA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086C3FC | 1_2_0086C3FC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097A315 | 1_2_0097A315 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F230C | 1_2_008F230C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086830D | 1_2_0086830D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009FE30C | 1_2_009FE30C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008BE311 | 1_2_008BE311 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00844320 | 1_2_00844320 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00848330 | 1_2_00848330 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009BE32F | 1_2_009BE32F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A4322 | 1_2_009A4322 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086A33F | 1_2_0086A33F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091E350 | 1_2_0091E350 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A2344 | 1_2_008A2344 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FE355 | 1_2_008FE355 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B6346 | 1_2_009B6346 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009BC377 | 1_2_009BC377 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00974364 | 1_2_00974364 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008DE378 | 1_2_008DE378 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094C362 | 1_2_0094C362 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D8377 | 1_2_008D8377 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00982494 | 1_2_00982494 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C4489 | 1_2_009C4489 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D04AD | 1_2_008D04AD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A64BA | 1_2_009A64BA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009284B8 | 1_2_009284B8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AA4A8 | 1_2_009AA4A8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AA4B3 | 1_2_008AA4B3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009104AE | 1_2_009104AE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A44DB | 1_2_009A44DB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D44D8 | 1_2_009D44D8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E44D4 | 1_2_008E44D4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F84D5 | 1_2_008F84D5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CA4C0 | 1_2_009CA4C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009884F8 | 1_2_009884F8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009304E0 | 1_2_009304E0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009844E5 | 1_2_009844E5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009984E7 | 1_2_009984E7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A0411 | 1_2_009A0411 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095240F | 1_2_0095240F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096E437 | 1_2_0096E437 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094A427 | 1_2_0094A427 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CC421 | 1_2_009CC421 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097845C | 1_2_0097845C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D246B | 1_2_008D246B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00996471 | 1_2_00996471 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00906479 | 1_2_00906479 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D4477 | 1_2_008D4477 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B0582 | 1_2_008B0582 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097C59D | 1_2_0097C59D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095E59E | 1_2_0095E59E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091A59D | 1_2_0091A59D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B6585 | 1_2_008B6585 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D85A9 | 1_2_008D85A9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098A5B1 | 1_2_0098A5B1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DC5B4 | 1_2_009DC5B4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009785BA | 1_2_009785BA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009205D0 | 1_2_009205D0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090C5C6 | 1_2_0090C5C6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F45D3 | 1_2_008F45D3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009865FC | 1_2_009865FC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EC5E4 | 1_2_008EC5E4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099E510 | 1_2_0099E510 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093A518 | 1_2_0093A518 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094E501 | 1_2_0094E501 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00862510 | 1_2_00862510 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D8533 | 1_2_009D8533 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091C52A | 1_2_0091C52A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093452D | 1_2_0093452D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B055A | 1_2_009B055A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C8559 | 1_2_009C8559 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098E549 | 1_2_0098E549 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A0558 | 1_2_008A0558 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B8555 | 1_2_008B8555 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092C54C | 1_2_0092C54C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00942570 | 1_2_00942570 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B669B | 1_2_009B669B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AE69E | 1_2_009AE69E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A2684 | 1_2_008A2684 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C269C | 1_2_008C269C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091068C | 1_2_0091068C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FA6AF | 1_2_008FA6AF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FC6A6 | 1_2_008FC6A6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009946B7 | 1_2_009946B7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A26AC | 1_2_009A26AC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F06B4 | 1_2_008F06B4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008686C0 | 1_2_008686C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EA6C5 | 1_2_008EA6C5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009486D8 | 1_2_009486D8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009146DE | 1_2_009146DE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009546C6 | 1_2_009546C6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008666D0 | 1_2_008666D0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AC6DC | 1_2_008AC6DC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094C6CF | 1_2_0094C6CF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D86D3 | 1_2_008D86D3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096C6E7 | 1_2_0096C6E7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009606EB | 1_2_009606EB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00900616 | 1_2_00900616 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B461C | 1_2_009B461C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00922607 | 1_2_00922607 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AC63B | 1_2_009AC63B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F6627 | 1_2_008F6627 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00944639 | 1_2_00944639 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E463A | 1_2_008E463A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008CA632 | 1_2_008CA632 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008BA64F | 1_2_008BA64F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A6643 | 1_2_008A6643 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093865E | 1_2_0093865E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D064D | 1_2_009D064D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C2647 | 1_2_009C2647 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00932677 | 1_2_00932677 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00926677 | 1_2_00926677 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00908666 | 1_2_00908666 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092E791 | 1_2_0092E791 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0084A780 | 1_2_0084A780 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093C79B | 1_2_0093C79B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B878F | 1_2_009B878F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00858792 | 1_2_00858792 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091E7BD | 1_2_0091E7BD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C47A3 | 1_2_008C47A3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CC7D8 | 1_2_009CC7D8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0085E7C0 | 1_2_0085E7C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009907DC | 1_2_009907DC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095C7C5 | 1_2_0095C7C5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C87D9 | 1_2_008C87D9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008BA7DE | 1_2_008BA7DE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009827C0 | 1_2_009827C0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00962716 | 1_2_00962716 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E0703 | 1_2_008E0703 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00964719 | 1_2_00964719 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00912702 | 1_2_00912702 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00846710 | 1_2_00846710 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D0711 | 1_2_008D0711 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099A728 | 1_2_0099A728 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090C750 | 1_2_0090C750 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095875F | 1_2_0095875F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009BC751 | 1_2_009BC751 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096E75D | 1_2_0096E75D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B2746 | 1_2_008B2746 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00950746 | 1_2_00950746 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099C778 | 1_2_0099C778 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098A775 | 1_2_0098A775 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EE77F | 1_2_008EE77F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00952763 | 1_2_00952763 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096876F | 1_2_0096876F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00934897 | 1_2_00934897 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098C897 | 1_2_0098C897 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00930883 | 1_2_00930883 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E2881 | 1_2_009E2881 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CA8B1 | 1_2_009CA8B1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0084C8B6 | 1_2_0084C8B6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A08DA | 1_2_009A08DA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008DA8CC | 1_2_008DA8CC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008688CB | 1_2_008688CB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AE8DE | 1_2_008AE8DE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092C8CE | 1_2_0092C8CE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096E8F7 | 1_2_0096E8F7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009BE8FF | 1_2_009BE8FF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009848F0 | 1_2_009848F0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009748FD | 1_2_009748FD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009248E2 | 1_2_009248E2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B08E0 | 1_2_009B08E0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F2809 | 1_2_008F2809 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A680D | 1_2_008A680D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00878810 | 1_2_00878810 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A682F | 1_2_008A682F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0085682D | 1_2_0085682D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AA828 | 1_2_009AA828 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D2833 | 1_2_008D2833 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00912851 | 1_2_00912851 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EC84F | 1_2_008EC84F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00966854 | 1_2_00966854 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00972851 | 1_2_00972851 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D8845 | 1_2_009D8845 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B0869 | 1_2_008B0869 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096A86F | 1_2_0096A86F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00936869 | 1_2_00936869 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094A993 | 1_2_0094A993 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A698E | 1_2_009A698E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00986983 | 1_2_00986983 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C29A6 | 1_2_008C29A6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B29B4 | 1_2_009B29B4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091C9AB | 1_2_0091C9AB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096C9AA | 1_2_0096C9AA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C29D0 | 1_2_009C29D0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009F49CC | 1_2_009F49CC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099E9C2 | 1_2_0099E9C2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CE9F8 | 1_2_009CE9F8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E49E7 | 1_2_008E49E7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092C9FF | 1_2_0092C9FF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E29FA | 1_2_008E29FA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009889E0 | 1_2_009889E0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A89F6 | 1_2_008A89F6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00916910 | 1_2_00916910 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091E916 | 1_2_0091E916 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008CC904 | 1_2_008CC904 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E4910 | 1_2_009E4910 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DE935 | 1_2_009DE935 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F8921 | 1_2_008F8921 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099692E | 1_2_0099692E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094692A | 1_2_0094692A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00860939 | 1_2_00860939 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00870940 | 1_2_00870940 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00928958 | 1_2_00928958 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AA95A | 1_2_008AA95A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096494C | 1_2_0096494C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00902971 | 1_2_00902971 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A0969 | 1_2_008A0969 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095696C | 1_2_0095696C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C4A8D | 1_2_008C4A8D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00932A8C | 1_2_00932A8C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B2ABA | 1_2_008B2ABA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00962AA0 | 1_2_00962AA0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00950AD2 | 1_2_00950AD2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FCAC1 | 1_2_008FCAC1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086CAD0 | 1_2_0086CAD0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009BCAFF | 1_2_009BCAFF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096AAF3 | 1_2_0096AAF3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A4AE0 | 1_2_008A4AE0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A4A12 | 1_2_009A4A12 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EEA05 | 1_2_008EEA05 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B8A00 | 1_2_008B8A00 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0084EA10 | 1_2_0084EA10 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00970A34 | 1_2_00970A34 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00948A3D | 1_2_00948A3D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008ECA39 | 1_2_008ECA39 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086CA49 | 1_2_0086CA49 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00980A57 | 1_2_00980A57 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AEA4A | 1_2_009AEA4A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00934A4B | 1_2_00934A4B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00992A7E | 1_2_00992A7E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A2A6B | 1_2_009A2A6B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090EA63 | 1_2_0090EA63 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00A06A56 | 1_2_00A06A56 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008DCA77 | 1_2_008DCA77 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F6A70 | 1_2_008F6A70 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F0B8F | 1_2_008F0B8F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00916B9F | 1_2_00916B9F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A2B93 | 1_2_008A2B93 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B8B94 | 1_2_008B8B94 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FEBA9 | 1_2_008FEBA9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092EBBC | 1_2_0092EBBC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00924BA3 | 1_2_00924BA3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098ABA5 | 1_2_0098ABA5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00986BA6 | 1_2_00986BA6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E0BD9 | 1_2_009E0BD9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008BABC1 | 1_2_008BABC1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00912BCB | 1_2_00912BCB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008ACBEE | 1_2_008ACBEE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F6BEB | 1_2_008F6BEB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B0BE0 | 1_2_008B0BE0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008CCBE0 | 1_2_008CCBE0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008CABE2 | 1_2_008CABE2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F2B0B | 1_2_008F2B0B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00956B11 | 1_2_00956B11 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00876B08 | 1_2_00876B08 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C2B19 | 1_2_008C2B19 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086CB11 | 1_2_0086CB11 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086CB22 | 1_2_0086CB22 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00918B23 | 1_2_00918B23 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C8B2E | 1_2_009C8B2E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00984B2C | 1_2_00984B2C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095AB2D | 1_2_0095AB2D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097EB2E | 1_2_0097EB2E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009ACB5A | 1_2_009ACB5A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0085CB40 | 1_2_0085CB40 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00900B56 | 1_2_00900B56 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090AB58 | 1_2_0090AB58 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008ECB5F | 1_2_008ECB5F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00866B50 | 1_2_00866B50 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EAB6F | 1_2_008EAB6F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00952B71 | 1_2_00952B71 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B8C9A | 1_2_009B8C9A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009AAC92 | 1_2_009AAC92 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097AC85 | 1_2_0097AC85 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D6C9E | 1_2_008D6C9E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095EC81 | 1_2_0095EC81 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0086AC90 | 1_2_0086AC90 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00950CB4 | 1_2_00950CB4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0087ECA0 | 1_2_0087ECA0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00954CBC | 1_2_00954CBC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E8CB5 | 1_2_008E8CB5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00968CA9 | 1_2_00968CA9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D2CC8 | 1_2_008D2CC8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00956CC7 | 1_2_00956CC7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C8CD8 | 1_2_008C8CD8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0097CCF1 | 1_2_0097CCF1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008EECE0 | 1_2_008EECE0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00966CE4 | 1_2_00966CE4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00896CFD | 1_2_00896CFD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D2CE0 | 1_2_009D2CE0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00986CE7 | 1_2_00986CE7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00998C13 | 1_2_00998C13 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00976C1C | 1_2_00976C1C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00926C1D | 1_2_00926C1D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DCC0B | 1_2_009DCC0B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00982C3A | 1_2_00982C3A |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099AC2F | 1_2_0099AC2F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DAC5C | 1_2_009DAC5C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00906C53 | 1_2_00906C53 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090CC5C | 1_2_0090CC5C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00920C5C | 1_2_00920C5C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D4C4D | 1_2_009D4C4D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00996C4E | 1_2_00996C4E |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008D8C6F | 1_2_008D8C6F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00844C60 | 1_2_00844C60 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009DEC78 | 1_2_009DEC78 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00994C70 | 1_2_00994C70 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098EC6F | 1_2_0098EC6F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B4D8F | 1_2_008B4D8F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A6D90 | 1_2_009A6D90 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E2D83 | 1_2_008E2D83 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092CD85 | 1_2_0092CD85 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008BCD91 | 1_2_008BCD91 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008AAD97 | 1_2_008AAD97 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CCDBE | 1_2_009CCDBE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009FADAD | 1_2_009FADAD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008FADBD | 1_2_008FADBD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00914DAA | 1_2_00914DAA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00928DD2 | 1_2_00928DD2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008DCDC6 | 1_2_008DCDC6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00996DD5 | 1_2_00996DD5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0092ADC3 | 1_2_0092ADC3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009CADEF | 1_2_009CADEF |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098EDE1 | 1_2_0098EDE1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00940DEE | 1_2_00940DEE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C0DE3 | 1_2_009C0DE3 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00932D17 | 1_2_00932D17 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F8D05 | 1_2_008F8D05 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E4D04 | 1_2_008E4D04 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00902D00 | 1_2_00902D00 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00974D03 | 1_2_00974D03 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00904D06 | 1_2_00904D06 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E6D3D | 1_2_008E6D3D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00924D25 | 1_2_00924D25 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C0D36 | 1_2_008C0D36 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0084CD46 | 1_2_0084CD46 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00964D47 | 1_2_00964D47 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008DED6F | 1_2_008DED6F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094ED79 | 1_2_0094ED79 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0091CD61 | 1_2_0091CD61 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0098CD6C | 1_2_0098CD6C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00910E94 | 1_2_00910E94 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099EE94 | 1_2_0099EE94 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B2E9C | 1_2_008B2E9C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00960E8F | 1_2_00960E8F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009D6E82 | 1_2_009D6E82 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00970EB9 | 1_2_00970EB9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00948ED4 | 1_2_00948ED4 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0087AEC0 | 1_2_0087AEC0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B6ED2 | 1_2_009B6ED2 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C4EFE | 1_2_009C4EFE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0094CEF1 | 1_2_0094CEF1 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00A04ECA | 1_2_00A04ECA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00922EFC | 1_2_00922EFC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00988EF6 | 1_2_00988EF6 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C4EFD | 1_2_008C4EFD |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009ACEEE | 1_2_009ACEEE |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0090EE14 | 1_2_0090EE14 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009A4E09 | 1_2_009A4E09 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093EE3C | 1_2_0093EE3C |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008BEE36 | 1_2_008BEE36 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0096EE57 | 1_2_0096EE57 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C6E4F | 1_2_009C6E4F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B2E45 | 1_2_009B2E45 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009BAE7D | 1_2_009BAE7D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00876E74 | 1_2_00876E74 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00932E6B | 1_2_00932E6B |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00992E60 | 1_2_00992E60 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009C6FB9 | 1_2_009C6FB9 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0087EFB0 | 1_2_0087EFB0 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009B4FAC | 1_2_009B4FAC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0095CFD8 | 1_2_0095CFD8 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0099EFD7 | 1_2_0099EFD7 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008B0FEB | 1_2_008B0FEB |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_009E0FEA | 1_2_009E0FEA |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00906FEC | 1_2_00906FEC |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00984FE5 | 1_2_00984FE5 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008E0F05 | 1_2_008E0F05 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00926F1F | 1_2_00926F1F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008A6F1D | 1_2_008A6F1D |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_0093CF0F | 1_2_0093CF0F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00912F0F | 1_2_00912F0F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_00992F25 | 1_2_00992F25 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008F4F32 | 1_2_008F4F32 |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | Code function: 1_2_008C2F4F | 1_2_008C2F4F |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 89801D second address: 898023 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 897804 second address: 897812 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEC34EF188Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 897812 second address: 897816 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A0EEFC second address: A0EF21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FEC34EF1892h 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e popad 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jl 00007FEC34EF1886h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A0F092 second address: A0F096 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A0F34E second address: A0F352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11CAB second address: 897804 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FEC34B4459Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 23FF671Ah 0x00000011 mov cl, 62h 0x00000013 push dword ptr [ebp+122D1519h] 0x00000019 mov ecx, dword ptr [ebp+122D27E6h] 0x0000001f call dword ptr [ebp+122D2FD3h] 0x00000025 pushad 0x00000026 cld 0x00000027 xor eax, eax 0x00000029 mov dword ptr [ebp+122D24B9h], ecx 0x0000002f mov edx, dword ptr [esp+28h] 0x00000033 stc 0x00000034 mov dword ptr [ebp+122D24B9h], esi 0x0000003a mov dword ptr [ebp+122D2AEEh], eax 0x00000040 add dword ptr [ebp+122D24B9h], ecx 0x00000046 mov esi, 0000003Ch 0x0000004b pushad 0x0000004c mov dword ptr [ebp+122D24B9h], ecx 0x00000052 jmp 00007FEC34B4459Dh 0x00000057 popad 0x00000058 add esi, dword ptr [esp+24h] 0x0000005c sub dword ptr [ebp+122D2F51h], edi 0x00000062 lodsw 0x00000064 jnc 00007FEC34B44597h 0x0000006a mov dword ptr [ebp+122D2676h], ebx 0x00000070 add eax, dword ptr [esp+24h] 0x00000074 mov dword ptr [ebp+122D1998h], esi 0x0000007a mov ebx, dword ptr [esp+24h] 0x0000007e pushad 0x0000007f or dword ptr [ebp+122D2676h], edi 0x00000085 jmp 00007FEC34B4459Bh 0x0000008a popad 0x0000008b nop 0x0000008c pushad 0x0000008d ja 00007FEC34B4459Ch 0x00000093 push eax 0x00000094 jmp 00007FEC34B445A6h 0x00000099 pop eax 0x0000009a popad 0x0000009b push eax 0x0000009c push eax 0x0000009d push edx 0x0000009e push ebx 0x0000009f push eax 0x000000a0 pop eax 0x000000a1 pop ebx 0x000000a2 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11CE2 second address: A11CF0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FEC34EF188Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11DF5 second address: A11E4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34B4459Ah 0x00000009 popad 0x0000000a jmp 00007FEC34B445A2h 0x0000000f popad 0x00000010 pop eax 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007FEC34B44598h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 00000016h 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b sub edx, 0593197Bh 0x00000031 lea ebx, dword ptr [ebp+1244DBE4h] 0x00000037 mov di, ED00h 0x0000003b xchg eax, ebx 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11E4C second address: A11E53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11E53 second address: A11E64 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEC34B44598h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11EAF second address: A11EB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11EB5 second address: A11F21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ebp 0x0000000a call 00007FEC34B44598h 0x0000000f pop ebp 0x00000010 mov dword ptr [esp+04h], ebp 0x00000014 add dword ptr [esp+04h], 00000018h 0x0000001c inc ebp 0x0000001d push ebp 0x0000001e ret 0x0000001f pop ebp 0x00000020 ret 0x00000021 cld 0x00000022 push 00000000h 0x00000024 mov dword ptr [ebp+122D2F51h], esi 0x0000002a call 00007FEC34B44599h 0x0000002f pushad 0x00000030 jng 00007FEC34B44598h 0x00000036 pushad 0x00000037 popad 0x00000038 jng 00007FEC34B4459Ch 0x0000003e jns 00007FEC34B44596h 0x00000044 popad 0x00000045 push eax 0x00000046 jnp 00007FEC34B445A2h 0x0000004c jg 00007FEC34B4459Ch 0x00000052 mov eax, dword ptr [esp+04h] 0x00000056 pushad 0x00000057 pushad 0x00000058 pushad 0x00000059 popad 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11F21 second address: A11F52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FEC34EF188Bh 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d jne 00007FEC34EF1890h 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b ja 00007FEC34EF1886h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11F52 second address: A11F56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11F56 second address: A11F5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11F5C second address: A11F62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11F62 second address: A11FD8 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEC34EF1886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d mov edi, esi 0x0000000f push 00000003h 0x00000011 call 00007FEC34EF188Ah 0x00000016 mov edx, 3AD1F4B9h 0x0000001b pop ecx 0x0000001c pushad 0x0000001d mov di, cx 0x00000020 mov bl, ah 0x00000022 popad 0x00000023 push 00000000h 0x00000025 push 00000000h 0x00000027 push ebp 0x00000028 call 00007FEC34EF1888h 0x0000002d pop ebp 0x0000002e mov dword ptr [esp+04h], ebp 0x00000032 add dword ptr [esp+04h], 0000001Ch 0x0000003a inc ebp 0x0000003b push ebp 0x0000003c ret 0x0000003d pop ebp 0x0000003e ret 0x0000003f jmp 00007FEC34EF188Ah 0x00000044 push 00000003h 0x00000046 jmp 00007FEC34EF1891h 0x0000004b push 837E2E96h 0x00000050 push eax 0x00000051 push edx 0x00000052 push ecx 0x00000053 push ebx 0x00000054 pop ebx 0x00000055 pop ecx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A11FD8 second address: A11FDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A1211B second address: A1211F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A1211F second address: A1214A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a push esi 0x0000000b js 00007FEC34B44596h 0x00000011 pop esi 0x00000012 push edi 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 pop edi 0x00000016 popad 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push edx 0x0000001f pop edx 0x00000020 jmp 00007FEC34B4459Ah 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A1214A second address: A121F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FEC34EF1886h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop eax 0x0000000f clc 0x00000010 push 00000003h 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007FEC34EF1888h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 0000001Ch 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c jo 00007FEC34EF188Bh 0x00000032 mov edx, 0FA89785h 0x00000037 push 00000000h 0x00000039 push edx 0x0000003a movzx esi, dx 0x0000003d pop esi 0x0000003e push 00000003h 0x00000040 push 00000000h 0x00000042 push ebp 0x00000043 call 00007FEC34EF1888h 0x00000048 pop ebp 0x00000049 mov dword ptr [esp+04h], ebp 0x0000004d add dword ptr [esp+04h], 0000001Ah 0x00000055 inc ebp 0x00000056 push ebp 0x00000057 ret 0x00000058 pop ebp 0x00000059 ret 0x0000005a or dword ptr [ebp+122D17C6h], ebx 0x00000060 jmp 00007FEC34EF1891h 0x00000065 mov dword ptr [ebp+122D269Eh], edx 0x0000006b call 00007FEC34EF1889h 0x00000070 push eax 0x00000071 push edx 0x00000072 push edi 0x00000073 jmp 00007FEC34EF1892h 0x00000078 pop edi 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A121F2 second address: A12250 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B445A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 jmp 00007FEC34B445A5h 0x00000015 jp 00007FEC34B44596h 0x0000001b popad 0x0000001c popad 0x0000001d mov eax, dword ptr [esp+04h] 0x00000021 jmp 00007FEC34B445A1h 0x00000026 mov eax, dword ptr [eax] 0x00000028 push eax 0x00000029 push edx 0x0000002a jo 00007FEC34B44598h 0x00000030 pushad 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A12250 second address: A12298 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e pushad 0x0000000f pushad 0x00000010 push esi 0x00000011 pop esi 0x00000012 push eax 0x00000013 pop eax 0x00000014 popad 0x00000015 jmp 00007FEC34EF1893h 0x0000001a popad 0x0000001b pop eax 0x0000001c jmp 00007FEC34EF188Ah 0x00000021 lea ebx, dword ptr [ebp+1244DBF8h] 0x00000027 adc ch, FFFFFFCCh 0x0000002a push eax 0x0000002b jp 00007FEC34EF1894h 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A12298 second address: A1229C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A2FEEC second address: A2FEF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A2FEF0 second address: A2FEF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A2FEF4 second address: A2FF15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FEC34EF1886h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 jmp 00007FEC34EF188Fh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A2FF15 second address: A2FF1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30438 second address: A30458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FEC34EF1886h 0x0000000a pop ecx 0x0000000b pop esi 0x0000000c jo 00007FEC34EF1898h 0x00000012 jng 00007FEC34EF1892h 0x00000018 je 00007FEC34EF1886h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A305D7 second address: A305DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A3070B second address: A30711 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30711 second address: A30741 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B4459Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a jnc 00007FEC34B445B6h 0x00000010 push esi 0x00000011 jne 00007FEC34B44596h 0x00000017 jmp 00007FEC34B445A0h 0x0000001c pop esi 0x0000001d push ebx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30866 second address: A3086B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30AF8 second address: A30AFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30FC6 second address: A30FCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30FCC second address: A30FD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30FD0 second address: A30FD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A30FD4 second address: A30FDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A31649 second address: A3164F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A31B0C second address: A31B2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jp 00007FEC34B44596h 0x0000000f jmp 00007FEC34B445A1h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A3E74E second address: A3E758 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FEC34EF188Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4030D second address: A4031C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007FEC34B44596h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4048D second address: A40493 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A41076 second address: A4107A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4107A second address: A41080 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A41080 second address: A41093 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FEC34B44598h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A41093 second address: A4109C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4109C second address: A410A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A410EF second address: A410FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jp 00007FEC34EF1886h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A410FF second address: A41103 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A41103 second address: A41111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FEC34EF188Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A41111 second address: A41158 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 xchg eax, ebx 0x00000006 push 00000000h 0x00000008 push ebx 0x00000009 call 00007FEC34B44598h 0x0000000e pop ebx 0x0000000f mov dword ptr [esp+04h], ebx 0x00000013 add dword ptr [esp+04h], 0000001Ch 0x0000001b inc ebx 0x0000001c push ebx 0x0000001d ret 0x0000001e pop ebx 0x0000001f ret 0x00000020 mov dword ptr [ebp+122D2213h], edx 0x00000026 nop 0x00000027 push ecx 0x00000028 jmp 00007FEC34B4459Eh 0x0000002d pop ecx 0x0000002e push eax 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 push edi 0x00000033 pop edi 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4146E second address: A41472 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A41472 second address: A4148F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jp 00007FEC34B445A3h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4163A second address: A41645 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FEC34EF1886h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A41645 second address: A41664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a jmp 00007FEC34B4459Ah 0x0000000f jns 00007FEC34B44596h 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A42541 second address: A42545 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A43640 second address: A43652 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEC34B4459Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A46C3E second address: A46C82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 cld 0x00000007 push 00000000h 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007FEC34EF1888h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 00000019h 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 push 00000000h 0x00000025 xor si, 9587h 0x0000002a ja 00007FEC34EF188Ch 0x00000030 xchg eax, ebx 0x00000031 push ecx 0x00000032 pushad 0x00000033 push ecx 0x00000034 pop ecx 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A46C82 second address: A46C8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4B294 second address: A4B2A5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jo 00007FEC34EF1886h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4B7B6 second address: A4B7C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4B7C1 second address: A4B7C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4B7C5 second address: A4B7C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4B7C9 second address: A4B7E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push ebx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FEC34EF1890h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4C820 second address: A4C839 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push eax 0x0000000b pop eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FEC34B4459Ah 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A45F5A second address: A45F68 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A506A0 second address: A506A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4C9B1 second address: A4C9B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A506A4 second address: A506B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jns 00007FEC34B44596h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4D8C2 second address: A4D8C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4D8C7 second address: A4D94C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007FEC34B44598h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 mov ebx, eax 0x00000028 push dword ptr fs:[00000000h] 0x0000002f push 00000000h 0x00000031 push edx 0x00000032 call 00007FEC34B44598h 0x00000037 pop edx 0x00000038 mov dword ptr [esp+04h], edx 0x0000003c add dword ptr [esp+04h], 0000001Ah 0x00000044 inc edx 0x00000045 push edx 0x00000046 ret 0x00000047 pop edx 0x00000048 ret 0x00000049 mov dword ptr fs:[00000000h], esp 0x00000050 mov edi, esi 0x00000052 mov eax, dword ptr [ebp+122D0EC1h] 0x00000058 mov dword ptr [ebp+12451123h], esi 0x0000005e push FFFFFFFFh 0x00000060 jmp 00007FEC34B4459Fh 0x00000065 push eax 0x00000066 pushad 0x00000067 push ebx 0x00000068 push ebx 0x00000069 pop ebx 0x0000006a pop ebx 0x0000006b pushad 0x0000006c push eax 0x0000006d push edx 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A50737 second address: A5073B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A51661 second address: A51675 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007FEC34B44598h 0x0000000c popad 0x0000000d push eax 0x0000000e push esi 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A526C8 second address: A526CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A526CC second address: A526D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A52771 second address: A52794 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FEC34EF1895h 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A52794 second address: A52798 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5363A second address: A53640 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A53640 second address: A536A0 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEC34B44596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push ecx 0x00000012 call 00007FEC34B44598h 0x00000017 pop ecx 0x00000018 mov dword ptr [esp+04h], ecx 0x0000001c add dword ptr [esp+04h], 00000016h 0x00000024 inc ecx 0x00000025 push ecx 0x00000026 ret 0x00000027 pop ecx 0x00000028 ret 0x00000029 push 00000000h 0x0000002b mov dword ptr [ebp+122D2F93h], eax 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push esi 0x00000036 call 00007FEC34B44598h 0x0000003b pop esi 0x0000003c mov dword ptr [esp+04h], esi 0x00000040 add dword ptr [esp+04h], 0000001Ah 0x00000048 inc esi 0x00000049 push esi 0x0000004a ret 0x0000004b pop esi 0x0000004c ret 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 pushad 0x00000053 popad 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A536A0 second address: A536A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5466F second address: A54673 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5768E second address: A57692 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A528FC second address: A52907 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A57692 second address: A57698 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A57698 second address: A576E5 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FEC34B44598h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d add ebx, dword ptr [ebp+12451249h] 0x00000013 push 00000000h 0x00000015 mov edi, eax 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push ebx 0x0000001c call 00007FEC34B44598h 0x00000021 pop ebx 0x00000022 mov dword ptr [esp+04h], ebx 0x00000026 add dword ptr [esp+04h], 00000018h 0x0000002e inc ebx 0x0000002f push ebx 0x00000030 ret 0x00000031 pop ebx 0x00000032 ret 0x00000033 movzx ebx, cx 0x00000036 xchg eax, esi 0x00000037 push eax 0x00000038 push edx 0x00000039 jno 00007FEC34B4459Ch 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A529FB second address: A52A05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FEC34EF1886h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5997A second address: A59980 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A59980 second address: A59A28 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnl 00007FEC34EF1892h 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push edi 0x00000013 call 00007FEC34EF1888h 0x00000018 pop edi 0x00000019 mov dword ptr [esp+04h], edi 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc edi 0x00000026 push edi 0x00000027 ret 0x00000028 pop edi 0x00000029 ret 0x0000002a jbe 00007FEC34EF1887h 0x00000030 stc 0x00000031 push 00000000h 0x00000033 call 00007FEC34EF188Bh 0x00000038 jmp 00007FEC34EF188Ah 0x0000003d pop ebx 0x0000003e push 00000000h 0x00000040 push 00000000h 0x00000042 push eax 0x00000043 call 00007FEC34EF1888h 0x00000048 pop eax 0x00000049 mov dword ptr [esp+04h], eax 0x0000004d add dword ptr [esp+04h], 0000001Ch 0x00000055 inc eax 0x00000056 push eax 0x00000057 ret 0x00000058 pop eax 0x00000059 ret 0x0000005a mov dword ptr [ebp+122D31BBh], ecx 0x00000060 sub dword ptr [ebp+122D3252h], edx 0x00000066 xchg eax, esi 0x00000067 jmp 00007FEC34EF188Ch 0x0000006c push eax 0x0000006d push eax 0x0000006e push eax 0x0000006f push edx 0x00000070 jmp 00007FEC34EF188Bh 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A53801 second address: A53805 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5A7E1 second address: A5A7E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A56911 second address: A56915 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5A7E5 second address: A5A7EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A56915 second address: A56932 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B445A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5A7EF second address: A5A86E instructions: 0x00000000 rdtsc 0x00000002 je 00007FEC34EF1886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push ebp 0x00000011 call 00007FEC34EF1888h 0x00000016 pop ebp 0x00000017 mov dword ptr [esp+04h], ebp 0x0000001b add dword ptr [esp+04h], 0000001Dh 0x00000023 inc ebp 0x00000024 push ebp 0x00000025 ret 0x00000026 pop ebp 0x00000027 ret 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c push edi 0x0000002d call 00007FEC34EF1888h 0x00000032 pop edi 0x00000033 mov dword ptr [esp+04h], edi 0x00000037 add dword ptr [esp+04h], 0000001Dh 0x0000003f inc edi 0x00000040 push edi 0x00000041 ret 0x00000042 pop edi 0x00000043 ret 0x00000044 sbb edi, 5B837714h 0x0000004a jns 00007FEC34EF188Ch 0x00000050 mov ebx, dword ptr [ebp+122D1D3Eh] 0x00000056 push 00000000h 0x00000058 push eax 0x00000059 push eax 0x0000005a push edx 0x0000005b push edx 0x0000005c jmp 00007FEC34EF188Ch 0x00000061 pop edx 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5A86E second address: A5A878 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FEC34B44596h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5D7DB second address: A5D7E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A02E3D second address: A02E43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5A961 second address: A5A96B instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FEC34EF188Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A5A96B second address: A5A987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FEC34B445A1h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 9FF8E9 second address: 9FF8EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 9FF8EF second address: 9FF908 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 pop eax 0x00000009 je 00007FEC34B4459Ch 0x0000000f js 00007FEC34B44596h 0x00000015 push eax 0x00000016 push edx 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6AC24 second address: A6AC6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF1892h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b pushad 0x0000000c jmp 00007FEC34EF1892h 0x00000011 push eax 0x00000012 pop eax 0x00000013 popad 0x00000014 pop ecx 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 js 00007FEC34EF18A9h 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FEC34EF188Dh 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6AE38 second address: A6AE3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6AE3F second address: A6AE45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6AE45 second address: A6AE49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A064FF second address: A06503 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A06503 second address: A06521 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34B445A4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A06521 second address: A06531 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jns 00007FEC34EF1886h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A06531 second address: A06543 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jne 00007FEC34B44596h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A06543 second address: A06547 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6F3BC second address: A6F3CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jnl 00007FEC34B44596h 0x0000000c jc 00007FEC34B44596h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6F3CF second address: A6F3EC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FEC34EF188Dh 0x0000000a pop ecx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6F3EC second address: A6F3F6 instructions: 0x00000000 rdtsc 0x00000002 je 00007FEC34B44596h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6F3F6 second address: A6F3FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A6FE30 second address: A6FE95 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEC34B445A7h 0x00000008 jmp 00007FEC34B445A6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jns 00007FEC34B445B7h 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FEC34B4459Ah 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A7000E second address: A7002E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEC34EF1899h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A7002E second address: A70034 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A702E8 second address: A702FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF188Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A76B6A second address: A76BA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B445A8h 0x00000007 js 00007FEC34B445A6h 0x0000000d jmp 00007FEC34B445A0h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 jne 00007FEC34B44596h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A76BA5 second address: A76BA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A76BA9 second address: A76BB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FEC34B44596h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A04961 second address: A04972 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FEC34EF1886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A75A06 second address: A75A0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A75B4D second address: A75B51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A760C6 second address: A76112 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B445A9h 0x00000007 jmp 00007FEC34B445A3h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jnp 00007FEC34B44598h 0x00000014 jnl 00007FEC34B4459Ch 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d push esi 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A76112 second address: A76117 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A76117 second address: A7612D instructions: 0x00000000 rdtsc 0x00000002 je 00007FEC34B4459Ch 0x00000008 jbe 00007FEC34B44596h 0x0000000e jp 00007FEC34B4459Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 9F8E5F second address: 9F8E8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF1895h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007FEC34EF1890h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A769A3 second address: A769A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A769A9 second address: A769AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A769AE second address: A769C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEC34B4459Dh 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A769C1 second address: A769CE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A769CE second address: A769D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A769D2 second address: A769E4 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FEC34EF1886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007FEC34EF1886h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A81760 second address: A81764 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A81764 second address: A81788 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ecx 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FEC34EF1898h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A81788 second address: A8178C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8099F second address: A809C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FEC34EF1890h 0x0000000d jnl 00007FEC34EF1886h 0x00000013 je 00007FEC34EF1886h 0x00000019 popad 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A809C7 second address: A809E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 popad 0x00000008 push edx 0x00000009 jmp 00007FEC34B445A0h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A809E4 second address: A809E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8110A second address: A81115 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FEC34B44596h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A81413 second address: A8141D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FEC34EF1886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A84B03 second address: A84B20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEC34B445A8h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A84B20 second address: A84B32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FEC34EF1886h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A84B32 second address: A84B4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34B445A5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A84B4B second address: A84B88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF188Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnc 00007FEC34EF1894h 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FEC34EF1896h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A492F9 second address: A492FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A492FF second address: A49303 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A49303 second address: A49319 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FEC34B44596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push edi 0x0000000f push edi 0x00000010 pop edi 0x00000011 pop edi 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A49319 second address: A4931D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A497AA second address: 897804 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FEC34B445A9h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov di, ax 0x0000000e push dword ptr [ebp+122D1519h] 0x00000014 call dword ptr [ebp+122D2FD3h] 0x0000001a pushad 0x0000001b cld 0x0000001c xor eax, eax 0x0000001e mov dword ptr [ebp+122D24B9h], ecx 0x00000024 mov edx, dword ptr [esp+28h] 0x00000028 stc 0x00000029 mov dword ptr [ebp+122D24B9h], esi 0x0000002f mov dword ptr [ebp+122D2AEEh], eax 0x00000035 add dword ptr [ebp+122D24B9h], ecx 0x0000003b mov esi, 0000003Ch 0x00000040 pushad 0x00000041 mov dword ptr [ebp+122D24B9h], ecx 0x00000047 jmp 00007FEC34B4459Dh 0x0000004c popad 0x0000004d add esi, dword ptr [esp+24h] 0x00000051 sub dword ptr [ebp+122D2F51h], edi 0x00000057 lodsw 0x00000059 jnc 00007FEC34B44597h 0x0000005f mov dword ptr [ebp+122D2676h], ebx 0x00000065 add eax, dword ptr [esp+24h] 0x00000069 mov dword ptr [ebp+122D1998h], esi 0x0000006f mov ebx, dword ptr [esp+24h] 0x00000073 pushad 0x00000074 or dword ptr [ebp+122D2676h], edi 0x0000007a jmp 00007FEC34B4459Bh 0x0000007f popad 0x00000080 nop 0x00000081 pushad 0x00000082 ja 00007FEC34B4459Ch 0x00000088 push eax 0x00000089 jmp 00007FEC34B445A6h 0x0000008e pop eax 0x0000008f popad 0x00000090 push eax 0x00000091 push eax 0x00000092 push edx 0x00000093 push ebx 0x00000094 push eax 0x00000095 pop eax 0x00000096 pop ebx 0x00000097 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A499A7 second address: A499C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEC34EF1895h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A49B5B second address: A49B78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34B445A8h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A84E49 second address: A84E4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A84F90 second address: A84F9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8523B second address: A8524F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007FEC34EF1886h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jc 00007FEC34EF188Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 9F73C3 second address: 9F73C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 9F73C7 second address: 9F73CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: 9F73CB second address: 9F73D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8A7BA second address: A8A7C9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FEC34EF1886h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8D559 second address: A8D55D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8D6AE second address: A8D6B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8D958 second address: A8D975 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEC34B445A9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A8D975 second address: A8D980 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A92D79 second address: A92D84 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A98606 second address: A9860C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A96E6F second address: A96E93 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 jnp 00007FEC34B44596h 0x0000000b pop ebx 0x0000000c pushad 0x0000000d jmp 00007FEC34B445A5h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9746F second address: A9747E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9747E second address: A97487 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9760F second address: A97659 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FEC34EF1892h 0x00000008 js 00007FEC34EF1888h 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FEC34EF1899h 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c jmp 00007FEC34EF188Bh 0x00000021 pushad 0x00000022 popad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A4A06A second address: A4A070 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9C37F second address: A9C396 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF188Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9C396 second address: A9C39C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9C39C second address: A9C3BB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FEC34EF188Fh 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FEC34EF1886h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9C3BB second address: A9C3F5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FEC34B445A7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FEC34B445A9h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9C3F5 second address: A9C3FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9B9F4 second address: A9BA20 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 jno 00007FEC34B44596h 0x0000000b pop ecx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 jmp 00007FEC34B445A4h 0x00000016 js 00007FEC34B44596h 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9BA20 second address: A9BA4B instructions: 0x00000000 rdtsc 0x00000002 jne 00007FEC34EF188Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FEC34EF1899h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9F718 second address: A9F732 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 js 00007FEC34B44596h 0x0000000b ja 00007FEC34B44596h 0x00000011 popad 0x00000012 ja 00007FEC34B4459Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9FD0F second address: A9FD15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: A9FD15 second address: A9FD1B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA74D2 second address: AA74D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA53C8 second address: AA53E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B445A6h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA53E4 second address: AA53EE instructions: 0x00000000 rdtsc 0x00000002 jp 00007FEC34EF188Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA56C5 second address: AA56C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA56C9 second address: AA56E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007FEC34EF189Ah 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA56E9 second address: AA56F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FEC34B44596h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA56F3 second address: AA5729 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FEC34EF188Dh 0x0000000c je 00007FEC34EF1886h 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jng 00007FEC34EF1897h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA5FF7 second address: AA6028 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FEC34B445A5h 0x0000000b jc 00007FEC34B445AAh 0x00000011 jmp 00007FEC34B4459Eh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA7172 second address: AA7176 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA7176 second address: AA7182 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA7182 second address: AA7186 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA7186 second address: AA71AA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edi 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007FEC34B445A5h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AA71AA second address: AA71BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FEC34EF1886h 0x0000000a popad 0x0000000b jg 00007FEC34EF188Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AAB192 second address: AAB19B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AAB886 second address: AAB8A1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jno 00007FEC34EF188Eh 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AAB8A1 second address: AAB8A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AAB9DF second address: AAB9FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF1897h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AABB55 second address: AABB9B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B4459Eh 0x00000007 jnc 00007FEC34B445BDh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AABB9B second address: AABBAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34EF188Bh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB89FA second address: AB8A0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jnc 00007FEC34B44596h 0x0000000c popad 0x0000000d push ecx 0x0000000e pushad 0x0000000f push edi 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB6B7F second address: AB6BCF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FEC34EF1886h 0x00000009 jl 00007FEC34EF1886h 0x0000000f push esi 0x00000010 pop esi 0x00000011 popad 0x00000012 jne 00007FEC34EF18AFh 0x00000018 pop edx 0x00000019 pop eax 0x0000001a je 00007FEC34EF189Eh 0x00000020 pushad 0x00000021 pushad 0x00000022 popad 0x00000023 pushad 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB7959 second address: AB795D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB795D second address: AB797B instructions: 0x00000000 rdtsc 0x00000002 jne 00007FEC34EF1886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jp 00007FEC34EF1886h 0x00000011 jmp 00007FEC34EF188Ch 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB797B second address: AB7985 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FEC34B44596h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB7985 second address: AB7993 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB7993 second address: AB79A1 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FEC34B44596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB79A1 second address: AB79A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB66E7 second address: AB66FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c pushad 0x0000000d pushad 0x0000000e jbe 00007FEC34B44596h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AB66FD second address: AB6703 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ABF51F second address: ABF52C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push ecx 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ABF242 second address: ABF25A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF188Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b jbe 00007FEC34EF1886h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACAD64 second address: ACAD6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FEC34B44596h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACAD6E second address: ACAD7D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF188Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACAD7D second address: ACAD9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FEC34B445A6h 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFAE7 second address: ACFB09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FEC34EF1886h 0x0000000a jmp 00007FEC34EF1898h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFB09 second address: ACFB1A instructions: 0x00000000 rdtsc 0x00000002 ja 00007FEC34B44596h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFB1A second address: ACFB27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jbe 00007FEC34EF1886h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFB27 second address: ACFB2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFB2E second address: ACFB36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFC5A second address: ACFC5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFC5E second address: ACFC64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: ACFC64 second address: ACFC72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007FEC34B44596h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AD8909 second address: AD890E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AD890E second address: AD8918 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FEC34B445A8h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AD8918 second address: AD892B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34EF188Ch 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AE21D7 second address: AE21DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AE21DD second address: AE21E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AE21E1 second address: AE21F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B445A2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AE204C second address: AE207A instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEC34EF1886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b jmp 00007FEC34EF188Ah 0x00000010 pop edi 0x00000011 popad 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FEC34EF1892h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AE207A second address: AE207E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AE38A6 second address: AE38B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FEC34EF1886h 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AE38B2 second address: AE38B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AEA51D second address: AEA521 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AEA999 second address: AEA99F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AEA99F second address: AEA9A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AEA9A5 second address: AEA9B4 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FEC34B44596h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AEEFD2 second address: AEEFE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c jl 00007FEC34EF1886h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AFF528 second address: AFF52C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AFF52C second address: AFF530 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: AFA877 second address: AFA885 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B0E0C5 second address: B0E0C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B0E0C9 second address: B0E0E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B445A7h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2249C second address: B224A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B22D19 second address: B22D1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B22D1D second address: B22D3F instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FEC34EF1886h 0x00000008 jne 00007FEC34EF1886h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 jmp 00007FEC34EF188Ch 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a pop edi 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B22D3F second address: B22D5D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 jmp 00007FEC34B4459Eh 0x0000000c popad 0x0000000d jl 00007FEC34B4459Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B22FF4 second address: B23023 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34EF1895h 0x00000007 jnc 00007FEC34EF188Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jl 00007FEC34EF1886h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B23023 second address: B2303B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEC34B4459Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2303B second address: B23040 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B23040 second address: B23045 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B23045 second address: B2304B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2318B second address: B2319E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34B4459Ah 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2319E second address: B231C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FEC34EF1899h 0x0000000c pushad 0x0000000d popad 0x0000000e pop eax 0x0000000f jg 00007FEC34EF188Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B231C9 second address: B231D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push edx 0x0000000b pop edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B231D9 second address: B231F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEC34EF1894h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B231F2 second address: B231FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B231FA second address: B23204 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FEC34EF1886h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B28D4A second address: B28D4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B28F33 second address: B28F37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B28F37 second address: B28F3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B28F3D second address: B29007 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push edx 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d jmp 00007FEC34EF1896h 0x00000012 push 00000004h 0x00000014 push 00000000h 0x00000016 push ebx 0x00000017 call 00007FEC34EF1888h 0x0000001c pop ebx 0x0000001d mov dword ptr [esp+04h], ebx 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc ebx 0x0000002a push ebx 0x0000002b ret 0x0000002c pop ebx 0x0000002d ret 0x0000002e call 00007FEC34EF1893h 0x00000033 movzx edx, dx 0x00000036 pop edx 0x00000037 movsx edx, ax 0x0000003a call 00007FEC34EF1889h 0x0000003f jnc 00007FEC34EF1894h 0x00000045 push eax 0x00000046 push esi 0x00000047 jnp 00007FEC34EF1893h 0x0000004d pop esi 0x0000004e mov eax, dword ptr [esp+04h] 0x00000052 jp 00007FEC34EF1896h 0x00000058 pushad 0x00000059 push ecx 0x0000005a pop ecx 0x0000005b jmp 00007FEC34EF188Ch 0x00000060 popad 0x00000061 mov eax, dword ptr [eax] 0x00000063 push eax 0x00000064 push edx 0x00000065 jp 00007FEC34EF189Ch 0x0000006b jmp 00007FEC34EF1896h 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B29007 second address: B2900C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2AB8F second address: B2AB93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2AB93 second address: B2ABA9 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FEC34B44596h 0x00000008 jo 00007FEC34B44596h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2ABA9 second address: B2ABAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2A756 second address: B2A761 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007FEC34B44596h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2A761 second address: B2A767 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2A767 second address: B2A78B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jnp 00007FEC34B4459Ch 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jl 00007FEC34B44596h 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2A78B second address: B2A78F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2A78F second address: B2A7A2 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FEC34B44596h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2C674 second address: B2C67E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FEC34EF1886h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2C67E second address: B2C682 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2C682 second address: B2C688 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6S7hoBEHvr.exe | RDTSC instruction interceptor: First address: B2C688 second address: B2C696 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEC34B4459Ah 0x00000009 rdtsc |