Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h] | 0_2_0074C767 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then lea edx, dword ptr [ecx+01h] | 0_2_0071B70C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then push C0BFD6CCh | 0_2_00733086 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then push C0BFD6CCh | 0_2_00733086 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then add ebp, dword ptr [esp+0Ch] | 0_2_0073B170 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h | 0_2_0074B1D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ebx, eax | 0_2_0074B1D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [ecx], dx | 0_2_007391DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ecx, dword ptr [ebp-20h] | 0_2_007391DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ebx, esi | 0_2_00732190 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [ebx], cx | 0_2_00732190 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 0_2_00732190 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh] | 0_2_00726263 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh] | 0_2_00725220 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [ebx], ax | 0_2_0072B2E0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax] | 0_2_0074F330 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh] | 0_2_00727380 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h | 0_2_0072D380 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh] | 0_2_00727380 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 0_2_00745450 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 0_2_007174F0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 0_2_007174F0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [ecx], dx | 0_2_007391DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ecx, dword ptr [ebp-20h] | 0_2_007391DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h | 0_2_007485E0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then jmp eax | 0_2_007485E0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then jmp dword ptr [0075450Ch] | 0_2_00728591 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then xor edi, edi | 0_2_0072759F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ecx, eax | 0_2_00719580 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [ebp+00h], ax | 0_2_00719580 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov eax, dword ptr [0075473Ch] | 0_2_0072C653 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 0_2_0073A700 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx eax, word ptr [edx] | 0_2_007297C2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [edi], dx | 0_2_007297C2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [esi], cx | 0_2_007297C2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h] | 0_2_0072E7C0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov esi, eax | 0_2_00725799 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ecx, eax | 0_2_00725799 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh] | 0_2_00733860 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then jmp eax | 0_2_0073984F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [ecx], bp | 0_2_0072D83A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [edi], al | 0_2_0072682D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+18h] | 0_2_0072682D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h] | 0_2_0072682D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov edx, ecx | 0_2_00748810 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh | 0_2_00748810 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh | 0_2_00748810 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then test eax, eax | 0_2_00748810 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov eax, dword ptr [esp+00000080h] | 0_2_007279C1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ebx, eax | 0_2_00715990 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ebp, eax | 0_2_00715990 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [esi], al | 0_2_0073DA53 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [edi], cl | 0_2_0073CA49 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then push esi | 0_2_00737AD3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [edi], cl | 0_2_0073CAD0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then push ebx | 0_2_0074CA93 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00738B61 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_0072CB40 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov word ptr [esi], cx | 0_2_0072CB40 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [edi], cl | 0_2_0073CB22 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [edi], cl | 0_2_0073CB11 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ebx, eax | 0_2_0071DBD9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ebx, eax | 0_2_0071DBD9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then cmp al, 2Eh | 0_2_00736B95 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then push 00000000h | 0_2_00739C2B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h] | 0_2_0074ECA0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h] | 0_2_00727DEE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov eax, dword ptr [ebp-68h] | 0_2_00738D93 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov edx, ebp | 0_2_00735E70 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then jmp dword ptr [007555F4h] | 0_2_00735E30 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ecx, eax | 0_2_0074AEC0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then xor byte ptr [esp+eax+17h], al | 0_2_00718F50 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [edi], bl | 0_2_00718F50 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov eax, dword ptr [ebx+edi+44h] | 0_2_00729F30 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov byte ptr [esi], al | 0_2_0072BF14 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then jmp ecx | 0_2_0071BFFD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then mov ecx, ebx | 0_2_0073DFE9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h] | 0_2_0074EFB0 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: hAmnMk8afk.exe, 00000000.00000002.1513854769.0000000001415000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.0000000001415000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://rapeflowwj.lat/apiros |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513799065.00000000013F3000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.0000000001415000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: hAmnMk8afk.exe, 00000000.00000002.1513854769.0000000001415000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.0000000001415000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/55 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1474125380.00000000013F3000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513854769.0000000001415000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513799065.00000000013F3000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.0000000001415000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1474003478.0000000001466000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.000000000147D000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1474003478.000000000140A000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: hAmnMk8afk.exe, 00000000.00000003.1473970189.0000000001475000.00000004.00000020.00020000.00000000.sdmp, hAmnMk8afk.exe, 00000000.00000002.1513941615.0000000001466000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00718850 | 0_2_00718850 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0071ACF0 | 0_2_0071ACF0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00811080 | 0_2_00811080 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080908C | 0_2_0080908C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A606A | 0_2_007A606A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D906E | 0_2_007D906E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00791064 | 0_2_00791064 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C3054 | 0_2_007C3054 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00797050 | 0_2_00797050 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AD045 | 0_2_007AD045 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078902C | 0_2_0078902C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B1022 | 0_2_007B1022 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E701E | 0_2_007E701E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008D40E5 | 0_2_008D40E5 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C800E | 0_2_007C800E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00796002 | 0_2_00796002 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007920E8 | 0_2_007920E8 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007850DC | 0_2_007850DC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079A0DF | 0_2_0079A0DF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007930D1 | 0_2_007930D1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007720CC | 0_2_007720CC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080B057 | 0_2_0080B057 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080105A | 0_2_0080105A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D609C | 0_2_007D609C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C709F | 0_2_007C709F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E009A | 0_2_007E009A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E508A | 0_2_007E508A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AC083 | 0_2_007AC083 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00795082 | 0_2_00795082 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0082707F | 0_2_0082707F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DB17E | 0_2_007DB17E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D8172 | 0_2_007D8172 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00780160 | 0_2_00780160 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EA150 | 0_2_007EA150 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AB142 | 0_2_007AB142 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FF13C | 0_2_007FF13C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AA13E | 0_2_007AA13E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B313C | 0_2_007B313C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B9133 | 0_2_007B9133 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B7132 | 0_2_007B7132 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077F124 | 0_2_0077F124 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F5123 | 0_2_007F5123 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F011B | 0_2_007F011B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008181EA | 0_2_008181EA |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008091EE | 0_2_008091EE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008211EC | 0_2_008211EC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CD10A | 0_2_007CD10A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A7102 | 0_2_007A7102 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BC106 | 0_2_007BC106 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081C1FF | 0_2_0081C1FF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B51FE | 0_2_007B51FE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007871F7 | 0_2_007871F7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00820112 | 0_2_00820112 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081E11B | 0_2_0081E11B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DE1E2 | 0_2_007DE1E2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074B1D0 | 0_2_0074B1D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B61DC | 0_2_007B61DC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007391DD | 0_2_007391DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007331C2 | 0_2_007331C2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007341C0 | 0_2_007341C0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00824135 | 0_2_00824135 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C51C4 | 0_2_007C51C4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F91C4 | 0_2_007F91C4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F41C1 | 0_2_007F41C1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007811B8 | 0_2_007811B8 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007191B0 | 0_2_007191B0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EC1AC | 0_2_007EC1AC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00812152 | 0_2_00812152 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007821A1 | 0_2_007821A1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00732190 | 0_2_00732190 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080516D | 0_2_0080516D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FB18F | 0_2_007FB18F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B8188 | 0_2_007B8188 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CB189 | 0_2_007CB189 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077B277 | 0_2_0077B277 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A4270 | 0_2_007A4270 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00726263 | 0_2_00726263 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00783262 | 0_2_00783262 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00773257 | 0_2_00773257 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008172A1 | 0_2_008172A1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CE257 | 0_2_007CE257 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078A24E | 0_2_0078A24E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077824A | 0_2_0077824A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C4243 | 0_2_007C4243 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EB23F | 0_2_007EB23F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B223F | 0_2_007B223F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080D2CD | 0_2_0080D2CD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078D236 | 0_2_0078D236 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00725220 | 0_2_00725220 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D9221 | 0_2_007D9221 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E621F | 0_2_007E621F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008002F6 | 0_2_008002F6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072B2E0 | 0_2_0072B2E0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00828220 | 0_2_00828220 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F52DC | 0_2_007F52DC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081B225 | 0_2_0081B225 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007992D3 | 0_2_007992D3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007352DD | 0_2_007352DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E82D0 | 0_2_007E82D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D52CF | 0_2_007D52CF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F72CD | 0_2_007F72CD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E32C1 | 0_2_007E32C1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CF2BD | 0_2_007CF2BD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081F24F | 0_2_0081F24F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00822252 | 0_2_00822252 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072E290 | 0_2_0072E290 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00716280 | 0_2_00716280 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00792368 | 0_2_00792368 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E935E | 0_2_007E935E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AF358 | 0_2_007AF358 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B8350 | 0_2_007B8350 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008083AC | 0_2_008083AC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DF34B | 0_2_007DF34B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074D34D | 0_2_0074D34D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00718330 | 0_2_00718330 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FE33D | 0_2_007FE33D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074F330 | 0_2_0074F330 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079A33C | 0_2_0079A33C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073A33F | 0_2_0073A33F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008013CC | 0_2_008013CC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008113D1 | 0_2_008113D1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00714320 | 0_2_00714320 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00735327 | 0_2_00735327 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FC310 | 0_2_007FC310 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078C308 | 0_2_0078C308 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BE309 | 0_2_007BE309 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080B3FD | 0_2_0080B3FD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073830D | 0_2_0073830D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007903FD | 0_2_007903FD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E53F7 | 0_2_007E53F7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007983F7 | 0_2_007983F7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00814318 | 0_2_00814318 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078B3D9 | 0_2_0078B3D9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078A3DD | 0_2_0078A3DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007783DF | 0_2_007783DF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E73D0 | 0_2_007E73D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080633C | 0_2_0080633C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A33C7 | 0_2_007A33C7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007843B9 | 0_2_007843B9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079E3B8 | 0_2_0079E3B8 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080E343 | 0_2_0080E343 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080A360 | 0_2_0080A360 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B139E | 0_2_007B139E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C039B | 0_2_007C039B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077639F | 0_2_0077639F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00734380 | 0_2_00734380 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F6388 | 0_2_007F6388 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DA47C | 0_2_007DA47C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078547D | 0_2_0078547D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00796471 | 0_2_00796471 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DB472 | 0_2_007DB472 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D6465 | 0_2_007D6465 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AD467 | 0_2_007AD467 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CC455 | 0_2_007CC455 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008164B1 | 0_2_008164B1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00771437 | 0_2_00771437 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B943D | 0_2_007B943D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008204D0 | 0_2_008204D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CA420 | 0_2_007CA420 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AE41D | 0_2_007AE41D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079F411 | 0_2_0079F411 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D0410 | 0_2_007D0410 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007174F0 | 0_2_007174F0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00815403 | 0_2_00815403 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081A40B | 0_2_0081A40B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B34F7 | 0_2_007B34F7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C24F2 | 0_2_007C24F2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0082341B | 0_2_0082341B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007864E3 | 0_2_007864E3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007391DD | 0_2_007391DD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C84DF | 0_2_007C84DF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F04DA | 0_2_007F04DA |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00880432 | 0_2_00880432 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080544A | 0_2_0080544A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007774AE | 0_2_007774AE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072148F | 0_2_0072148F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077257F | 0_2_0077257F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080C58A | 0_2_0080C58A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A656C | 0_2_007A656C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0082659E | 0_2_0082659E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077C551 | 0_2_0077C551 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D5546 | 0_2_007D5546 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008035BF | 0_2_008035BF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BB53A | 0_2_007BB53A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008215CA | 0_2_008215CA |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078F525 | 0_2_0078F525 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F451F | 0_2_007F451F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00770516 | 0_2_00770516 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078251A | 0_2_0078251A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00732510 | 0_2_00732510 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081C5E7 | 0_2_0081C5E7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E4519 | 0_2_007E4519 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081E5F1 | 0_2_0081E5F1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A850B | 0_2_007A850B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00747500 | 0_2_00747500 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008135F7 | 0_2_008135F7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AC505 | 0_2_007AC505 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00810515 | 0_2_00810515 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077F5E2 | 0_2_0077F5E2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008E3527 | 0_2_008E3527 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BA5CB | 0_2_007BA5CB |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FF5CB | 0_2_007FF5CB |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078D5CE | 0_2_0078D5CE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EE5C7 | 0_2_007EE5C7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FA5C2 | 0_2_007FA5C2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00825542 | 0_2_00825542 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008D254C | 0_2_008D254C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077D5B5 | 0_2_0077D5B5 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00812546 | 0_2_00812546 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F15B7 | 0_2_007F15B7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078B5A4 | 0_2_0078B5A4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B059B | 0_2_007B059B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AA593 | 0_2_007AA593 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D7597 | 0_2_007D7597 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072759F | 0_2_0072759F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00719580 | 0_2_00719580 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077A585 | 0_2_0077A585 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078058E | 0_2_0078058E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E5580 | 0_2_007E5580 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081A686 | 0_2_0081A686 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00793671 | 0_2_00793671 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00773679 | 0_2_00773679 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DE662 | 0_2_007DE662 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C665D | 0_2_007C665D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EF65D | 0_2_007EF65D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F5657 | 0_2_007F5657 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DD64C | 0_2_007DD64C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008176B7 | 0_2_008176B7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008186B6 | 0_2_008186B6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078062F | 0_2_0078062F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00737603 | 0_2_00737603 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081B6F1 | 0_2_0081B6F1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008096F6 | 0_2_008096F6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EA602 | 0_2_007EA602 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080B600 | 0_2_0080B600 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F76FC | 0_2_007F76FC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007336E2 | 0_2_007336E2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007766E9 | 0_2_007766E9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007366D0 | 0_2_007366D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CE6D7 | 0_2_007CE6D7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C06D1 | 0_2_007C06D1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007386C0 | 0_2_007386C0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0082863B | 0_2_0082863B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F86C4 | 0_2_007F86C4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007706C8 | 0_2_007706C8 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007826B9 | 0_2_007826B9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B86B8 | 0_2_007B86B8 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079E6B5 | 0_2_0079E6B5 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EB6B3 | 0_2_007EB6B3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FB6B0 | 0_2_007FB6B0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CF6A6 | 0_2_007CF6A6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0082266E | 0_2_0082266E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077B699 | 0_2_0077B699 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FD68D | 0_2_007FD68D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00808673 | 0_2_00808673 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00771689 | 0_2_00771689 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00779688 | 0_2_00779688 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A2778 | 0_2_007A2778 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078C77D | 0_2_0078C77D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078377F | 0_2_0078377F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080A78E | 0_2_0080A78E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B276E | 0_2_007B276E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081E7A6 | 0_2_0081E7A6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078D756 | 0_2_0078D756 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E7750 | 0_2_007E7750 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F374A | 0_2_007F374A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081C7B4 | 0_2_0081C7B4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C4733 | 0_2_007C4733 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008127D0 | 0_2_008127D0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074F720 | 0_2_0074F720 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00716710 | 0_2_00716710 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E271F | 0_2_007E271F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B6712 | 0_2_007B6712 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A3717 | 0_2_007A3717 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008107F8 | 0_2_008107F8 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FC7EC | 0_2_007FC7EC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081F71D | 0_2_0081F71D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007297C2 | 0_2_007297C2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072E7C0 | 0_2_0072E7C0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C27C7 | 0_2_007C27C7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080573C | 0_2_0080573C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FE7B8 | 0_2_007FE7B8 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007787BB | 0_2_007787BB |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080274D | 0_2_0080274D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B97B5 | 0_2_007B97B5 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AC7B5 | 0_2_007AC7B5 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007757A4 | 0_2_007757A4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DF7AE | 0_2_007DF7AE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008EF76E | 0_2_008EF76E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00728792 | 0_2_00728792 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079679B | 0_2_0079679B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079B79B | 0_2_0079B79B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00725799 | 0_2_00725799 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0071A780 | 0_2_0071A780 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A078B | 0_2_007A078B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00807775 | 0_2_00807775 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A178C | 0_2_007A178C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079F782 | 0_2_0079F782 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080677B | 0_2_0080677B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AE871 | 0_2_007AE871 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00733860 | 0_2_00733860 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00804895 | 0_2_00804895 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D886B | 0_2_007D886B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077B868 | 0_2_0077B868 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A4865 | 0_2_007A4865 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00776850 | 0_2_00776850 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008198B7 | 0_2_008198B7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C0841 | 0_2_007C0841 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F6842 | 0_2_007F6842 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E983F | 0_2_007E983F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008158C9 | 0_2_008158C9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DB82A | 0_2_007DB82A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072682D | 0_2_0072682D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00773828 | 0_2_00773828 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079981A | 0_2_0079981A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00748810 | 0_2_00748810 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080F8E5 | 0_2_0080F8E5 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008D08FE | 0_2_008D08FE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078480E | 0_2_0078480E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EC802 | 0_2_007EC802 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079D804 | 0_2_0079D804 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D38F6 | 0_2_007D38F6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F08EF | 0_2_007F08EF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007708E2 | 0_2_007708E2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007928D4 | 0_2_007928D4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007968C9 | 0_2_007968C9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007388CB | 0_2_007388CB |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CC8C2 | 0_2_007CC8C2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007748B1 | 0_2_007748B1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007318A0 | 0_2_007318A0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077C8A9 | 0_2_0077C8A9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00823862 | 0_2_00823862 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080886E | 0_2_0080886E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00798888 | 0_2_00798888 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074D880 | 0_2_0074D880 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078A88C | 0_2_0078A88C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AF88E | 0_2_007AF88E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0082587C | 0_2_0082587C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00713970 | 0_2_00713970 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CD97F | 0_2_007CD97F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F997B | 0_2_007F997B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D1976 | 0_2_007D1976 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B396F | 0_2_007B396F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00777961 | 0_2_00777961 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078E966 | 0_2_0078E966 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E595A | 0_2_007E595A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A1953 | 0_2_007A1953 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00740940 | 0_2_00740940 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008C49CC | 0_2_008C49CC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E193E | 0_2_007E193E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00730939 | 0_2_00730939 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CA936 | 0_2_007CA936 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B9921 | 0_2_007B9921 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008E19D1 | 0_2_008E19D1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008009E9 | 0_2_008009E9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008049EF | 0_2_008049EF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_008119FF | 0_2_008119FF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007729F0 | 0_2_007729F0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F29EB | 0_2_007F29EB |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DC9DC | 0_2_007DC9DC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DB9D9 | 0_2_007DB9D9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C19D6 | 0_2_007C19D6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007279C1 | 0_2_007279C1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A89CC | 0_2_007A89CC |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00821938 | 0_2_00821938 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A09B2 | 0_2_007A09B2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007ED9A9 | 0_2_007ED9A9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00715990 | 0_2_00715990 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A999C | 0_2_007A999C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074D980 | 0_2_0074D980 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079398C | 0_2_0079398C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BB983 | 0_2_007BB983 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00822A81 | 0_2_00822A81 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079EA7D | 0_2_0079EA7D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D6A76 | 0_2_007D6A76 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00778A67 | 0_2_00778A67 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00805A90 | 0_2_00805A90 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F3A65 | 0_2_007F3A65 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073DA53 | 0_2_0073DA53 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A7A5C | 0_2_007A7A5C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081FAA6 | 0_2_0081FAA6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E0A4C | 0_2_007E0A4C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00797A40 | 0_2_00797A40 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073CA49 | 0_2_0073CA49 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00827AC0 | 0_2_00827AC0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00782A3D | 0_2_00782A3D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078CA3D | 0_2_0078CA3D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D2A3A | 0_2_007D2A3A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AAA31 | 0_2_007AAA31 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EFA35 | 0_2_007EFA35 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A3A36 | 0_2_007A3A36 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00814AD6 | 0_2_00814AD6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077DA2D | 0_2_0077DA2D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EBA20 | 0_2_007EBA20 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0071EA10 | 0_2_0071EA10 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F1A19 | 0_2_007F1A19 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B0A10 | 0_2_007B0A10 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B6A10 | 0_2_007B6A10 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C3A09 | 0_2_007C3A09 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077AA0D | 0_2_0077AA0D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077FA0C | 0_2_0077FA0C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00785AF9 | 0_2_00785AF9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E3AFD | 0_2_007E3AFD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B8AFE | 0_2_007B8AFE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F7AF7 | 0_2_007F7AF7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BEAEA | 0_2_007BEAEA |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00783AE2 | 0_2_00783AE2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073CAD0 | 0_2_0073CAD0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D3AC0 | 0_2_007D3AC0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078AAC7 | 0_2_0078AAC7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00825A3D | 0_2_00825A3D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00781AB6 | 0_2_00781AB6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078FAA2 | 0_2_0078FAA2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E2AA3 | 0_2_007E2AA3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BAA93 | 0_2_007BAA93 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007BDA92 | 0_2_007BDA92 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DDA8F | 0_2_007DDA8F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074DA80 | 0_2_0074DA80 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007EEA86 | 0_2_007EEA86 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078BA82 | 0_2_0078BA82 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080AB88 | 0_2_0080AB88 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B7B77 | 0_2_007B7B77 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F8B6F | 0_2_007F8B6F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074DB60 | 0_2_0074DB60 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00736B50 | 0_2_00736B50 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D4B52 | 0_2_007D4B52 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072CB40 | 0_2_0072CB40 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00784B44 | 0_2_00784B44 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00817BC1 | 0_2_00817BC1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00806BC1 | 0_2_00806BC1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D7B35 | 0_2_007D7B35 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00809BCE | 0_2_00809BCE |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073CB22 | 0_2_0073CB22 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00795B19 | 0_2_00795B19 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073CB11 | 0_2_0073CB11 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00822BE7 | 0_2_00822BE7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FCB18 | 0_2_007FCB18 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C5B09 | 0_2_007C5B09 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00746B08 | 0_2_00746B08 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0077EBF2 | 0_2_0077EBF2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0079BBE1 | 0_2_0079BBE1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00824B18 | 0_2_00824B18 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00818B1A | 0_2_00818B1A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00812B22 | 0_2_00812B22 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081AB25 | 0_2_0081AB25 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0071DBD9 | 0_2_0071DBD9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00788BD1 | 0_2_00788BD1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00826B2E | 0_2_00826B2E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E3BD0 | 0_2_007E3BD0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_009C4B29 | 0_2_009C4B29 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C2BB3 | 0_2_007C2BB3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C0B96 | 0_2_007C0B96 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072FC75 | 0_2_0072FC75 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007CBC6F | 0_2_007CBC6F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080FCA0 | 0_2_0080FCA0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00804CA1 | 0_2_00804CA1 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0081CCA9 | 0_2_0081CCA9 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007ECC53 | 0_2_007ECC53 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00810CAF | 0_2_00810CAF |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00821CB2 | 0_2_00821CB2 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D0C47 | 0_2_007D0C47 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E1C45 | 0_2_007E1C45 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0080ECBD | 0_2_0080ECBD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007C7C3D | 0_2_007C7C3D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007ADC3D | 0_2_007ADC3D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00787C2F | 0_2_00787C2F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00739C2B | 0_2_00739C2B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007ABC27 | 0_2_007ABC27 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0072DC00 | 0_2_0072DC00 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A9C0C | 0_2_007A9C0C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E9C05 | 0_2_007E9C05 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A0CF3 | 0_2_007A0CF3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00770CE3 | 0_2_00770CE3 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00800C1B | 0_2_00800C1B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007FACDD | 0_2_007FACDD |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00813C2B | 0_2_00813C2B |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A6CD6 | 0_2_007A6CD6 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00776CC7 | 0_2_00776CC7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00774CC4 | 0_2_00774CC4 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0074ECA0 | 0_2_0074ECA0 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00819C58 | 0_2_00819C58 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00796CA7 | 0_2_00796CA7 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0073AC90 | 0_2_0073AC90 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0078AC82 | 0_2_0078AC82 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007AAD78 | 0_2_007AAD78 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F0D77 | 0_2_007F0D77 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007B6D6E | 0_2_007B6D6E |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00825D9F | 0_2_00825D9F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00820D9D | 0_2_00820D9D |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007D6D5F | 0_2_007D6D5F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00792D5C | 0_2_00792D5C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007F4D56 | 0_2_007F4D56 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_0071CD46 | 0_2_0071CD46 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007E7D45 | 0_2_007E7D45 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00767D4A | 0_2_00767D4A |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00799D46 | 0_2_00799D46 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007DBD3F | 0_2_007DBD3F |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00773D32 | 0_2_00773D32 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_00778D2C | 0_2_00778D2C |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | Code function: 0_2_007A8D26 | 0_2_007A8D26 |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 7684F6 second address: 768512 instructions: 0x00000000 rdtsc 0x00000002 je 00007FD6ACD16896h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FD6ACD1689Ch 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 768512 second address: 768518 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 768518 second address: 767E03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD168A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a clc 0x0000000b push dword ptr [ebp+122D16B1h] 0x00000011 jmp 00007FD6ACD1689Bh 0x00000016 call dword ptr [ebp+122D1CCFh] 0x0000001c pushad 0x0000001d pushad 0x0000001e xor esi, 22DF0466h 0x00000024 popad 0x00000025 xor eax, eax 0x00000027 clc 0x00000028 mov edx, dword ptr [esp+28h] 0x0000002c cmc 0x0000002d mov dword ptr [ebp+122D2E38h], eax 0x00000033 jmp 00007FD6ACD1689Ah 0x00000038 mov esi, 0000003Ch 0x0000003d pushad 0x0000003e sub ebx, dword ptr [ebp+122D2E9Ch] 0x00000044 mov di, 7E85h 0x00000048 popad 0x00000049 jmp 00007FD6ACD168A3h 0x0000004e add esi, dword ptr [esp+24h] 0x00000052 sub dword ptr [ebp+122D1F36h], eax 0x00000058 lodsw 0x0000005a sub dword ptr [ebp+122D1F36h], edx 0x00000060 add eax, dword ptr [esp+24h] 0x00000064 jmp 00007FD6ACD168A4h 0x00000069 mov dword ptr [ebp+122D1DA2h], eax 0x0000006f mov ebx, dword ptr [esp+24h] 0x00000073 jmp 00007FD6ACD168A9h 0x00000078 push eax 0x00000079 pushad 0x0000007a jmp 00007FD6ACD1689Dh 0x0000007f push eax 0x00000080 push edx 0x00000081 push eax 0x00000082 pop eax 0x00000083 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8E923D second address: 8E9265 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD6ACE2A806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007FD6ACE2A81Ah 0x00000010 jmp 00007FD6ACE2A80Eh 0x00000015 je 00007FD6ACE2A806h 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8E93C1 second address: 8E93DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jbe 00007FD6ACD168A7h 0x0000000c jmp 00007FD6ACD1689Bh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED194 second address: 767E03 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 xor dword ptr [esp], 02916D72h 0x0000000e xor si, 10A9h 0x00000013 push dword ptr [ebp+122D16B1h] 0x00000019 sub cx, B03Dh 0x0000001e mov edx, 39E654C3h 0x00000023 call dword ptr [ebp+122D1CCFh] 0x00000029 pushad 0x0000002a pushad 0x0000002b xor esi, 22DF0466h 0x00000031 popad 0x00000032 xor eax, eax 0x00000034 clc 0x00000035 mov edx, dword ptr [esp+28h] 0x00000039 cmc 0x0000003a mov dword ptr [ebp+122D2E38h], eax 0x00000040 jmp 00007FD6ACE2A80Ah 0x00000045 mov esi, 0000003Ch 0x0000004a pushad 0x0000004b sub ebx, dword ptr [ebp+122D2E9Ch] 0x00000051 mov di, 7E85h 0x00000055 popad 0x00000056 jmp 00007FD6ACE2A813h 0x0000005b add esi, dword ptr [esp+24h] 0x0000005f sub dword ptr [ebp+122D1F36h], eax 0x00000065 lodsw 0x00000067 sub dword ptr [ebp+122D1F36h], edx 0x0000006d add eax, dword ptr [esp+24h] 0x00000071 jmp 00007FD6ACE2A814h 0x00000076 mov dword ptr [ebp+122D1DA2h], eax 0x0000007c mov ebx, dword ptr [esp+24h] 0x00000080 jmp 00007FD6ACE2A819h 0x00000085 push eax 0x00000086 pushad 0x00000087 jmp 00007FD6ACE2A80Dh 0x0000008c push eax 0x0000008d push edx 0x0000008e push eax 0x0000008f pop eax 0x00000090 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED1F0 second address: 8ED232 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD6ACD1689Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push ebx 0x0000000c jc 00007FD6ACD1689Ch 0x00000012 pop ebx 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push eax 0x00000018 push edx 0x00000019 ja 00007FD6ACD168ADh 0x0000001f jmp 00007FD6ACD168A7h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED232 second address: 8ED238 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED238 second address: 8ED24C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c jnc 00007FD6ACD16898h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED24C second address: 8ED274 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FD6ACE2A806h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FD6ACE2A813h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED274 second address: 8ED2CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [ebp+122D1D50h] 0x0000000e push 00000003h 0x00000010 jmp 00007FD6ACD1689Ah 0x00000015 push 00000000h 0x00000017 clc 0x00000018 push 00000003h 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007FD6ACD16898h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 00000018h 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 push edi 0x00000035 mov dword ptr [ebp+122D1DA2h], ebx 0x0000003b pop esi 0x0000003c call 00007FD6ACD16899h 0x00000041 push eax 0x00000042 push edx 0x00000043 je 00007FD6ACD16898h 0x00000049 push eax 0x0000004a pop eax 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED2CE second address: 8ED2D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED2D4 second address: 8ED348 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD168A8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jp 00007FD6ACD168AAh 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 pushad 0x00000017 jmp 00007FD6ACD168A0h 0x0000001c jmp 00007FD6ACD168A6h 0x00000021 popad 0x00000022 mov eax, dword ptr [eax] 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FD6ACD1689Bh 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED42B second address: 8ED430 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED430 second address: 8ED435 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED435 second address: 8ED493 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xor dword ptr [esp], 02C9D595h 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007FD6ACE2A808h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 0000001Bh 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 mov dword ptr [ebp+122D1EA6h], esi 0x0000002e push 00000003h 0x00000030 add cx, 87C1h 0x00000035 push 00000000h 0x00000037 jmp 00007FD6ACE2A80Eh 0x0000003c push 00000003h 0x0000003e stc 0x0000003f push 86E8CC61h 0x00000044 push eax 0x00000045 push edx 0x00000046 pushad 0x00000047 push esi 0x00000048 pop esi 0x00000049 pushad 0x0000004a popad 0x0000004b popad 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED493 second address: 8ED499 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED499 second address: 8ED4C7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add dword ptr [esp], 3917339Fh 0x0000000f movzx ecx, dx 0x00000012 lea ebx, dword ptr [ebp+124590F7h] 0x00000018 xor dword ptr [ebp+122D1E4Ah], ecx 0x0000001e mov dword ptr [ebp+122D3186h], edx 0x00000024 push eax 0x00000025 jl 00007FD6ACE2A80Eh 0x0000002b push esi 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED51F second address: 8ED59D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 jg 00007FD6ACD16896h 0x0000000c pop eax 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 mov si, D89Fh 0x00000015 push 00000000h 0x00000017 jng 00007FD6ACD16899h 0x0000001d adc ch, FFFFFFB7h 0x00000020 push 67FFBAAAh 0x00000025 ja 00007FD6ACD168A8h 0x0000002b xor dword ptr [esp], 67FFBA2Ah 0x00000032 mov ecx, dword ptr [ebp+122D2CDCh] 0x00000038 push 00000003h 0x0000003a push 00000000h 0x0000003c mov esi, dword ptr [ebp+122D2E78h] 0x00000042 push 00000003h 0x00000044 and di, E700h 0x00000049 call 00007FD6ACD16899h 0x0000004e pushad 0x0000004f push eax 0x00000050 push edx 0x00000051 jmp 00007FD6ACD168A7h 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED59D second address: 8ED5A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED5A1 second address: 8ED5D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007FD6ACD1689Dh 0x0000000c pop ebx 0x0000000d popad 0x0000000e push eax 0x0000000f push ecx 0x00000010 jmp 00007FD6ACD1689Fh 0x00000015 pop ecx 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a push ecx 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED5D1 second address: 8ED5E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop ecx 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED5E3 second address: 8ED607 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD168A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jbe 00007FD6ACD168A4h 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED607 second address: 8ED60D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED60D second address: 8ED650 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 mov ecx, dword ptr [ebp+122D36ECh] 0x0000000c lea ebx, dword ptr [ebp+12459102h] 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007FD6ACD16898h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c mov dword ptr [ebp+122D33F1h], esi 0x00000032 xor esi, dword ptr [ebp+122D2F2Ch] 0x00000038 xchg eax, ebx 0x00000039 pushad 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8ED650 second address: 8ED654 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90C005 second address: 90C02A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnp 00007FD6ACD16896h 0x0000000b jmp 00007FD6ACD168A1h 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90C02A second address: 90C034 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FD6ACE2A806h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90C034 second address: 90C03A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90C596 second address: 90C59F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90C59F second address: 90C5A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90CD5E second address: 90CD63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90D058 second address: 90D05E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90D05E second address: 90D062 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9026B3 second address: 9026BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FD6ACD16896h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9026BD second address: 9026C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8CE9E5 second address: 8CE9EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8CE9EE second address: 8CEA0E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jns 00007FD6ACE2A806h 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FD6ACE2A810h 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8CEA0E second address: 8CEA12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8CEA12 second address: 8CEA54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jo 00007FD6ACE2A808h 0x0000000f push edi 0x00000010 pop edi 0x00000011 push edi 0x00000012 jmp 00007FD6ACE2A819h 0x00000017 jmp 00007FD6ACE2A810h 0x0000001c pop edi 0x0000001d push eax 0x0000001e push edx 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8CEA54 second address: 8CEA58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90DB24 second address: 90DB47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A815h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007FD6ACE2A806h 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918C7E second address: 918CA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007FD6ACD16896h 0x0000000c jmp 00007FD6ACD168A1h 0x00000011 popad 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918CA1 second address: 918CA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918CA7 second address: 918CBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACD1689Bh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918CBC second address: 918CD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push esi 0x00000006 jmp 00007FD6ACE2A813h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9180C4 second address: 9180E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FD6ACD16896h 0x0000000a popad 0x0000000b jo 00007FD6ACD168AEh 0x00000011 jmp 00007FD6ACD168A2h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9180E9 second address: 9180ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9026D2 second address: 9026D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91826F second address: 918275 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9183C2 second address: 9183DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACD168A1h 0x00000009 pop edi 0x0000000a popad 0x0000000b push edx 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9187F2 second address: 9187F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9187F9 second address: 918819 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FD6ACD1689Eh 0x00000008 ja 00007FD6ACD16898h 0x0000000e push eax 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918819 second address: 91881F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91895F second address: 918963 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918963 second address: 918986 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD6ACE2A814h 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918986 second address: 918994 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD1689Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918994 second address: 9189A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9189A0 second address: 9189AA instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD6ACD16896h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9189AA second address: 9189C6 instructions: 0x00000000 rdtsc 0x00000002 je 00007FD6ACE2A81Eh 0x00000008 jmp 00007FD6ACE2A812h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918B14 second address: 918B28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 popad 0x00000008 push edx 0x00000009 jns 00007FD6ACD16898h 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 918B28 second address: 918B34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FD6ACE2A806h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91B79D second address: 91B7A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91B8DA second address: 91B8E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91BC77 second address: 91BC84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FD6ACD16896h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91BC84 second address: 91BC88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C392 second address: 91C3A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD1689Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C3A8 second address: 91C3AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C3AC second address: 91C3B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C53D second address: 91C551 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jne 00007FD6ACE2A806h 0x00000011 push esi 0x00000012 pop esi 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C6FE second address: 91C702 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C702 second address: 91C706 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C850 second address: 91C854 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C91E second address: 91C92F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jp 00007FD6ACE2A814h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91C92F second address: 91C933 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91DA70 second address: 91DA74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91DA74 second address: 91DAFF instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD6ACD16896h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b mov dword ptr [esp], eax 0x0000000e mov esi, 401482E9h 0x00000013 push 00000000h 0x00000015 mov si, A832h 0x00000019 and edi, dword ptr [ebp+122D2C3Ch] 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push esi 0x00000024 call 00007FD6ACD16898h 0x00000029 pop esi 0x0000002a mov dword ptr [esp+04h], esi 0x0000002e add dword ptr [esp+04h], 0000001Dh 0x00000036 inc esi 0x00000037 push esi 0x00000038 ret 0x00000039 pop esi 0x0000003a ret 0x0000003b call 00007FD6ACD1689Ch 0x00000040 add dword ptr [ebp+12469AEBh], edi 0x00000046 pop edi 0x00000047 xchg eax, ebx 0x00000048 push esi 0x00000049 pushad 0x0000004a jmp 00007FD6ACD168A4h 0x0000004f jmp 00007FD6ACD168A4h 0x00000054 popad 0x00000055 pop esi 0x00000056 push eax 0x00000057 pushad 0x00000058 push eax 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91EBFC second address: 91EC00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91EC00 second address: 91EC06 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91EC06 second address: 91EC0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91EC0B second address: 91EC11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91EC11 second address: 91EC6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov dword ptr [ebp+122D59DBh], ebx 0x00000010 push 00000000h 0x00000012 cmc 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edx 0x00000018 call 00007FD6ACE2A808h 0x0000001d pop edx 0x0000001e mov dword ptr [esp+04h], edx 0x00000022 add dword ptr [esp+04h], 0000001Ch 0x0000002a inc edx 0x0000002b push edx 0x0000002c ret 0x0000002d pop edx 0x0000002e ret 0x0000002f call 00007FD6ACE2A80Ch 0x00000034 pop esi 0x00000035 mov esi, dword ptr [ebp+122D2E80h] 0x0000003b xchg eax, ebx 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FD6ACE2A80Fh 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91EC6F second address: 91EC75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91F507 second address: 91F50B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 920CC3 second address: 920CC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 920CC8 second address: 920CCD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 922615 second address: 922619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 923F1F second address: 923F62 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD6ACE2A806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD6ACE2A816h 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 pushad 0x00000014 xor edi, 39C9B4CEh 0x0000001a and cx, FAA3h 0x0000001f popad 0x00000020 push 00000000h 0x00000022 mov dword ptr [ebp+1245973Fh], ebx 0x00000028 push 00000000h 0x0000002a mov bx, si 0x0000002d xchg eax, esi 0x0000002e pushad 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 923F62 second address: 923F71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 je 00007FD6ACD1689Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 923F71 second address: 923F7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 923F7B second address: 923F81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 923F81 second address: 923F9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD6ACE2A814h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 924199 second address: 92419D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92419D second address: 9241B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A814h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 927F10 second address: 927F14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 927F14 second address: 927F1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 928F5D second address: 928FE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push esi 0x00000006 pop esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b js 00007FD6ACD168AEh 0x00000011 jmp 00007FD6ACD168A8h 0x00000016 nop 0x00000017 push 00000000h 0x00000019 push ecx 0x0000001a call 00007FD6ACD16898h 0x0000001f pop ecx 0x00000020 mov dword ptr [esp+04h], ecx 0x00000024 add dword ptr [esp+04h], 0000001Ah 0x0000002c inc ecx 0x0000002d push ecx 0x0000002e ret 0x0000002f pop ecx 0x00000030 ret 0x00000031 mov dword ptr [ebp+1247C9CBh], ecx 0x00000037 mov dword ptr [ebp+122D1BE2h], ebx 0x0000003d push 00000000h 0x0000003f jmp 00007FD6ACD168A6h 0x00000044 push 00000000h 0x00000046 stc 0x00000047 push esi 0x00000048 jns 00007FD6ACD16899h 0x0000004e pop edi 0x0000004f xchg eax, esi 0x00000050 pushad 0x00000051 push esi 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92A1F2 second address: 92A21A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FD6ACE2A817h 0x0000000f jc 00007FD6ACE2A806h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9292AB second address: 9292B5 instructions: 0x00000000 rdtsc 0x00000002 je 00007FD6ACD16896h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9292B5 second address: 9292BA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92A420 second address: 92A424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92B441 second address: 92B448 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92B448 second address: 92B452 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FD6ACD16896h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92F24A second address: 92F25A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A80Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92F25A second address: 92F28C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FD6ACD16896h 0x00000009 jmp 00007FD6ACD168A5h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jno 00007FD6ACD16896h 0x0000001b jo 00007FD6ACD16896h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9301DD second address: 930230 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FD6ACE2A80Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007FD6ACE2A80Bh 0x00000010 nop 0x00000011 mov dword ptr [ebp+122D3072h], ebx 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007FD6ACE2A808h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 00000016h 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 mov dword ptr [ebp+122D1CCAh], edi 0x00000039 push 00000000h 0x0000003b cld 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f push edi 0x00000040 pushad 0x00000041 popad 0x00000042 pop edi 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 930230 second address: 930236 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 931296 second address: 9312C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A815h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007FD6ACE2A811h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9312C5 second address: 931338 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push esi 0x0000000a call 00007FD6ACD16898h 0x0000000f pop esi 0x00000010 mov dword ptr [esp+04h], esi 0x00000014 add dword ptr [esp+04h], 0000001Dh 0x0000001c inc esi 0x0000001d push esi 0x0000001e ret 0x0000001f pop esi 0x00000020 ret 0x00000021 push edx 0x00000022 or bx, D6BFh 0x00000027 pop ebx 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c push edx 0x0000002d call 00007FD6ACD16898h 0x00000032 pop edx 0x00000033 mov dword ptr [esp+04h], edx 0x00000037 add dword ptr [esp+04h], 00000014h 0x0000003f inc edx 0x00000040 push edx 0x00000041 ret 0x00000042 pop edx 0x00000043 ret 0x00000044 push 00000000h 0x00000046 mov ebx, dword ptr [ebp+122D3B8Ah] 0x0000004c push eax 0x0000004d pushad 0x0000004e ja 00007FD6ACD168A5h 0x00000054 pushad 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92E438 second address: 92E43C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 92E43C second address: 92E442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9387B2 second address: 9387B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9387B6 second address: 9387BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D8E12 second address: 8D8E29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A813h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D8E29 second address: 8D8E2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93E056 second address: 93E05A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93E05A second address: 93E066 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD6ACD16896h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93E066 second address: 93E08A instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD6ACE2A81Dh 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93D7BA second address: 93D7BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93D7BE second address: 93D7CA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93D7CA second address: 93D7D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93D7D0 second address: 93D7D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93DA9B second address: 93DAA5 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD6ACD168B2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93DAA5 second address: 93DAC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACE2A816h 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d jno 00007FD6ACE2A806h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 93DBFD second address: 93DC07 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD6ACD16896h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8DA990 second address: 8DA99B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FD6ACE2A806h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 946B81 second address: 946B87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 946B87 second address: 946B91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD6ACE2A806h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 946B91 second address: 946BB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FD6ACD168A6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e jng 00007FD6ACD16896h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 947415 second address: 947429 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACE2A80Ch 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9479A0 second address: 9479A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9479A4 second address: 9479A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9479A8 second address: 9479B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9479B2 second address: 9479B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9479B6 second address: 9479BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9479BA second address: 9479C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D575E second address: 8D579B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD6ACD1689Dh 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b jmp 00007FD6ACD168A8h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 ja 00007FD6ACD16896h 0x0000001c jl 00007FD6ACD16896h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D579B second address: 8D57AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A80Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 94B139 second address: 94B14B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 je 00007FD6ACD16896h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop esi 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A0B8 second address: 91A10D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 jmp 00007FD6ACE2A818h 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push edx 0x0000000f call 00007FD6ACE2A808h 0x00000014 pop edx 0x00000015 mov dword ptr [esp+04h], edx 0x00000019 add dword ptr [esp+04h], 0000001Ah 0x00000021 inc edx 0x00000022 push edx 0x00000023 ret 0x00000024 pop edx 0x00000025 ret 0x00000026 movsx edi, dx 0x00000029 lea eax, dword ptr [ebp+12485E5Dh] 0x0000002f nop 0x00000030 jo 00007FD6ACE2A818h 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A10D second address: 91A111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A111 second address: 9026B3 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD6ACE2A806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007FD6ACE2A815h 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push edi 0x00000014 call 00007FD6ACE2A808h 0x00000019 pop edi 0x0000001a mov dword ptr [esp+04h], edi 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc edi 0x00000027 push edi 0x00000028 ret 0x00000029 pop edi 0x0000002a ret 0x0000002b call 00007FD6ACE2A813h 0x00000030 or dword ptr [ebp+122D1D3Ch], edi 0x00000036 pop edi 0x00000037 call dword ptr [ebp+122D2F7Ch] 0x0000003d push esi 0x0000003e pushad 0x0000003f pushad 0x00000040 popad 0x00000041 je 00007FD6ACE2A806h 0x00000047 push edi 0x00000048 pop edi 0x00000049 jmp 00007FD6ACE2A812h 0x0000004e popad 0x0000004f push eax 0x00000050 push edx 0x00000051 push eax 0x00000052 push edx 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A2CC second address: 91A2F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD6ACD168A5h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f ja 00007FD6ACD16898h 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A6AF second address: 91A6B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A6B3 second address: 91A6B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A6B8 second address: 767E03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a call 00007FD6ACE2A80Eh 0x0000000f mov edi, dword ptr [ebp+122D36CAh] 0x00000015 pop edi 0x00000016 push dword ptr [ebp+122D16B1h] 0x0000001c mov edi, dword ptr [ebp+122D36F1h] 0x00000022 call dword ptr [ebp+122D1CCFh] 0x00000028 pushad 0x00000029 pushad 0x0000002a xor esi, 22DF0466h 0x00000030 popad 0x00000031 xor eax, eax 0x00000033 clc 0x00000034 mov edx, dword ptr [esp+28h] 0x00000038 cmc 0x00000039 mov dword ptr [ebp+122D2E38h], eax 0x0000003f jmp 00007FD6ACE2A80Ah 0x00000044 mov esi, 0000003Ch 0x00000049 pushad 0x0000004a sub ebx, dword ptr [ebp+122D2E9Ch] 0x00000050 mov di, 7E85h 0x00000054 popad 0x00000055 jmp 00007FD6ACE2A813h 0x0000005a add esi, dword ptr [esp+24h] 0x0000005e sub dword ptr [ebp+122D1F36h], eax 0x00000064 lodsw 0x00000066 sub dword ptr [ebp+122D1F36h], edx 0x0000006c add eax, dword ptr [esp+24h] 0x00000070 jmp 00007FD6ACE2A814h 0x00000075 mov dword ptr [ebp+122D1DA2h], eax 0x0000007b mov ebx, dword ptr [esp+24h] 0x0000007f jmp 00007FD6ACE2A819h 0x00000084 push eax 0x00000085 pushad 0x00000086 jmp 00007FD6ACE2A80Dh 0x0000008b push eax 0x0000008c push edx 0x0000008d push eax 0x0000008e pop eax 0x0000008f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A735 second address: 91A770 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 2A5A8690h 0x00000011 jmp 00007FD6ACD1689Eh 0x00000016 push 67FDCD8Ah 0x0000001b push ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FD6ACD168A4h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91A996 second address: 91A99B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91B180 second address: 91B186 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91B186 second address: 91B18A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91B37E second address: 903227 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACD1689Eh 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d mov cx, 0215h 0x00000011 lea eax, dword ptr [ebp+12485E5Dh] 0x00000017 push 00000000h 0x00000019 push eax 0x0000001a call 00007FD6ACD16898h 0x0000001f pop eax 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 add dword ptr [esp+04h], 0000001Bh 0x0000002c inc eax 0x0000002d push eax 0x0000002e ret 0x0000002f pop eax 0x00000030 ret 0x00000031 movzx edi, ax 0x00000034 jg 00007FD6ACD1689Ah 0x0000003a nop 0x0000003b jnp 00007FD6ACD1689Eh 0x00000041 push eax 0x00000042 jmp 00007FD6ACD168A7h 0x00000047 nop 0x00000048 push 00000000h 0x0000004a push edx 0x0000004b call 00007FD6ACD16898h 0x00000050 pop edx 0x00000051 mov dword ptr [esp+04h], edx 0x00000055 add dword ptr [esp+04h], 00000015h 0x0000005d inc edx 0x0000005e push edx 0x0000005f ret 0x00000060 pop edx 0x00000061 ret 0x00000062 mov edx, dword ptr [ebp+122D2CA4h] 0x00000068 call dword ptr [ebp+122D3CE0h] 0x0000006e pushad 0x0000006f pushad 0x00000070 pushad 0x00000071 popad 0x00000072 pushad 0x00000073 popad 0x00000074 push eax 0x00000075 push edx 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 903227 second address: 903232 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 903232 second address: 903238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 903238 second address: 90323C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 90323C second address: 903250 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pushad 0x00000008 popad 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007FD6ACD16896h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 903250 second address: 903254 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 94B858 second address: 94B85C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 94B85C second address: 94B87D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A817h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c push eax 0x0000000d pop eax 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 94B87D second address: 94B883 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 94B883 second address: 94B889 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 94BB32 second address: 94BB36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 94BB36 second address: 94BB76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FD6ACE2A806h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jno 00007FD6ACE2A825h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FD6ACE2A80Dh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9518E7 second address: 951926 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACD168A0h 0x00000009 popad 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jc 00007FD6ACD16896h 0x00000013 pop edx 0x00000014 pop ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FD6ACD168A3h 0x0000001c pushad 0x0000001d push ecx 0x0000001e pop ecx 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 push edi 0x00000022 pop edi 0x00000023 push ebx 0x00000024 pop ebx 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8DE0C3 second address: 8DE0E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD6ACE2A806h 0x0000000a popad 0x0000000b jmp 00007FD6ACE2A817h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8DE0E5 second address: 8DE0EF instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FD6ACD1689Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959BEA second address: 959BF4 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD6ACE2A806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959BF4 second address: 959C33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FD6ACD168A2h 0x0000000a push edi 0x0000000b pop edi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jnl 00007FD6ACD168A8h 0x00000016 push eax 0x00000017 push edx 0x00000018 jl 00007FD6ACD16896h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959C33 second address: 959C37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959C37 second address: 959C3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959C3B second address: 959C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 958702 second address: 958710 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD1689Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 958710 second address: 958730 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 je 00007FD6ACE2A806h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushad 0x00000012 jbe 00007FD6ACE2A806h 0x00000018 push eax 0x00000019 pop eax 0x0000001a push edx 0x0000001b pop edx 0x0000001c popad 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 958B43 second address: 958B4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 95911E second address: 959127 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959127 second address: 95912D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 95912D second address: 95914E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A80Dh 0x00000007 jmp 00007FD6ACE2A810h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 95939A second address: 9593A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD6ACD16896h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 95963C second address: 959642 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959642 second address: 959681 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 pushad 0x0000000a jmp 00007FD6ACD168A9h 0x0000000f push ebx 0x00000010 push edi 0x00000011 pop edi 0x00000012 jnl 00007FD6ACD16896h 0x00000018 pop ebx 0x00000019 pushad 0x0000001a jmp 00007FD6ACD1689Fh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959A6F second address: 959A7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007FD6ACE2A817h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 959A7C second address: 959A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACD1689Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 95EFA1 second address: 95EFE4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FD6ACE2A813h 0x0000000d push esi 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FD6ACE2A80Fh 0x00000015 pop esi 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push esi 0x0000001a jnp 00007FD6ACE2A806h 0x00000020 pop esi 0x00000021 jmp 00007FD6ACE2A80Ah 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 95F2E1 second address: 95F2FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 je 00007FD6ACD1689Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 95F2FB second address: 95F314 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A810h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 961932 second address: 961940 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FD6ACD16896h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 961940 second address: 961948 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 96684A second address: 966868 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 je 00007FD6ACD16896h 0x0000000c pop ecx 0x0000000d push edx 0x0000000e jmp 00007FD6ACD1689Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8E1519 second address: 8E1555 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 popad 0x00000008 jns 00007FD6ACE2A819h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FD6ACE2A817h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8E1555 second address: 8E1562 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 jng 00007FD6ACD16896h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 966547 second address: 96655D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACE2A80Fh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 96655D second address: 966577 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD168A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 96B3DC second address: 96B3F7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD6ACE2A81Dh 0x00000008 jmp 00007FD6ACE2A811h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 96B562 second address: 96B56C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FD6ACD1689Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 96B6D7 second address: 96B6F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACE2A816h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 96B874 second address: 96B889 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FD6ACD16896h 0x0000000a jno 00007FD6ACD16896h 0x00000010 popad 0x00000011 push eax 0x00000012 push edi 0x00000013 pop edi 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97196A second address: 971970 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 970541 second address: 97055D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD168A1h 0x00000007 push eax 0x00000008 jp 00007FD6ACD16896h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9706C8 second address: 9706DA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A80Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97085D second address: 970863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91AE14 second address: 91AE1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 970B8D second address: 970B93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 970B93 second address: 970BAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FD6ACE2A80Ah 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007FD6ACE2A806h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 970BAC second address: 970BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 970BB0 second address: 970BB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 970D49 second address: 970D4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 970D4D second address: 970D59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FD6ACE2A806h 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 975CDC second address: 975CF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACD168A5h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 975CF7 second address: 975D02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 975D02 second address: 975D18 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD1689Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b jp 00007FD6ACD16896h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D3B71 second address: 8D3B98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD6ACE2A80Eh 0x0000000c jmp 00007FD6ACE2A812h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D3B98 second address: 8D3B9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D3B9C second address: 8D3BA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D3BA8 second address: 8D3BBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FD6ACD1689Ah 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97BD5F second address: 97BD69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD6ACE2A806h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97C87B second address: 97C88F instructions: 0x00000000 rdtsc 0x00000002 jc 00007FD6ACD16896h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007FD6ACD168A2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97C88F second address: 97C895 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97C895 second address: 97C8B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FD6ACD168A7h 0x0000000a jmp 00007FD6ACD1689Fh 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 jnl 00007FD6ACD16896h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97C8B9 second address: 97C8BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97CBE9 second address: 97CBF4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97D7CE second address: 97D80C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A818h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FD6ACE2A817h 0x00000013 jnc 00007FD6ACE2A806h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97D80C second address: 97D81F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD1689Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 97DB32 second address: 97DB38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9862A4 second address: 9862AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9862AD second address: 9862BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FD6ACE2A806h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9862BA second address: 9862C4 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FD6ACD16896h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 985381 second address: 985385 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9854FE second address: 985502 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 985502 second address: 98550D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9857C3 second address: 9857CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 jg 00007FD6ACD16896h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9857CF second address: 9857F8 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD6ACE2A806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FD6ACE2A819h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9857F8 second address: 9857FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9857FC second address: 98581F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD6ACE2A813h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007FD6ACE2A806h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 98581F second address: 985823 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 985823 second address: 985829 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 985829 second address: 985840 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD6ACD168A2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 985B39 second address: 985B6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FD6ACE2A806h 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d je 00007FD6ACE2A808h 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 jne 00007FD6ACE2A806h 0x0000001c pushad 0x0000001d popad 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FD6ACE2A810h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 98C418 second address: 98C429 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jno 00007FD6ACD16896h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 98D232 second address: 98D240 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jne 00007FD6ACE2A806h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 8D739D second address: 8D73A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 996072 second address: 996076 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 996076 second address: 9960A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD6ACD16896h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FD6ACD168A3h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FD6ACD168A0h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9960A9 second address: 9960AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9961F6 second address: 996211 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD6ACD16896h 0x00000008 jmp 00007FD6ACD1689Bh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 996211 second address: 996217 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9A250A second address: 9A2538 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a jmp 00007FD6ACD168A6h 0x0000000f jmp 00007FD6ACD1689Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9A2538 second address: 9A2552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FD6ACE2A811h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9A2552 second address: 9A255B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9ABB67 second address: 9ABB92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FD6ACE2A806h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c pop eax 0x0000000d popad 0x0000000e js 00007FD6ACE2A821h 0x00000014 jmp 00007FD6ACE2A815h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9BC054 second address: 9BC05A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9BC05A second address: 9BC060 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9BC060 second address: 9BC07A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD6ACD168A6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9BC07A second address: 9BC09E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A818h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b js 00007FD6ACE2A806h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9BF389 second address: 9BF38F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9BF38F second address: 9BF397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C35F6 second address: 9C3602 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FD6ACD16896h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C3602 second address: 9C3621 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007FD6ACE2A810h 0x0000000b jmp 00007FD6ACE2A80Ah 0x00000010 popad 0x00000011 push ecx 0x00000012 js 00007FD6ACE2A80Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C3C08 second address: 9C3C10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C3E99 second address: 9C3EC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A812h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD6ACE2A816h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C3EC7 second address: 9C3ED5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FD6ACD1689Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C7F72 second address: 9C7F78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C8103 second address: 9C8107 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C8107 second address: 9C8116 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FD6ACE2A806h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C8116 second address: 9C811D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9C811D second address: 9C8136 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A814h 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9CB176 second address: 9CB17A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9CB17A second address: 9CB187 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9CB187 second address: 9CB18B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9CB18B second address: 9CB18F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9CB18F second address: 9CB1A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD6ACD1689Ch 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9CB1A3 second address: 9CB1A9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9CB1A9 second address: 9CB1AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9D2371 second address: 9D2391 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACE2A818h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9D2391 second address: 9D2397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9D2397 second address: 9D23A7 instructions: 0x00000000 rdtsc 0x00000002 js 00007FD6ACE2A806h 0x00000008 jnp 00007FD6ACE2A806h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9D23A7 second address: 9D23B9 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FD6ACD1689Ch 0x00000008 je 00007FD6ACD16896h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9E4890 second address: 9E4896 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9E4896 second address: 9E48A9 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD6ACD1689Ch 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9E48A9 second address: 9E48BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007FD6ACE2A80Ah 0x0000000f push edx 0x00000010 pop edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9E68A0 second address: 9E68C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jp 00007FD6ACD16896h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FD6ACD168A1h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC14A second address: 9FC156 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC156 second address: 9FC15A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC417 second address: 9FC41C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC570 second address: 9FC593 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FD6ACD168A9h 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC593 second address: 9FC59B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC9CF second address: 9FC9D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC9D3 second address: 9FC9D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC9D9 second address: 9FC9E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC9E3 second address: 9FC9E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC9E7 second address: 9FC9ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FC9ED second address: 9FCA0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD6ACE2A80Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007FD6ACE2A806h 0x00000013 jnc 00007FD6ACE2A806h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCB9E second address: 9FCBC2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD6ACD1689Ah 0x00000008 jne 00007FD6ACD16896h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jc 00007FD6ACD16896h 0x00000019 jnp 00007FD6ACD16896h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCF9F second address: 9FCFA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCFA3 second address: 9FCFC5 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD6ACD16896h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD6ACD168A2h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCFC5 second address: 9FCFCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCFCB second address: 9FCFDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FD6ACD16896h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCFDC second address: 9FCFE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCFE0 second address: 9FCFE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FCFE4 second address: 9FCFEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FFEAE second address: 9FFEEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 jmp 00007FD6ACD168A2h 0x0000000d popad 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 jns 00007FD6ACD16899h 0x00000018 push 00000004h 0x0000001a mov dx, cx 0x0000001d call 00007FD6ACD16899h 0x00000022 pushad 0x00000023 pushad 0x00000024 push ebx 0x00000025 pop ebx 0x00000026 pushad 0x00000027 popad 0x00000028 popad 0x00000029 push esi 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 9FFEEE second address: 9FFEFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91E5BC second address: 91E5CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 ja 00007FD6ACD16898h 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91E975 second address: 91E992 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FD6ACE2A806h 0x00000009 jo 00007FD6ACE2A806h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jng 00007FD6ACE2A806h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hAmnMk8afk.exe | RDTSC instruction interceptor: First address: 91E992 second address: 91E9AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD6ACD168A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |