Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2269408398.0000000005AF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2223120012.000000000132F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: tPSrcPbmRe.exe, 00000000.00000003.2293272842.0000000005AD5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189. |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: tPSrcPbmRe.exe, 00000000.00000003.2293272842.0000000005AD5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2223120012.000000000132F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2293272842.0000000005AD5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: tPSrcPbmRe.exe, tPSrcPbmRe.exe, 00000000.00000003.2267311649.0000000005AD5000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2320307864.00000000012F5000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2245471516.000000000135C000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2268779813.0000000005AD6000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198657134.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2267092336.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2220955202.00000000012AE000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2369256724.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2320254445.0000000005AD5000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2271074155.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2293272842.0000000005AD5000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2245238274.0000000001354000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000002.2378751257.0000000005AD6000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2245414561.0000000001354000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2220817144.000000000133A000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2293140651.00000000012EA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000002.2377002468.00000000012EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/2U |
Source: tPSrcPbmRe.exe, 00000000.00000002.2378751257.0000000005ADF000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2369256724.0000000005ADF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/I |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198657134.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000002.2377002468.00000000012EE000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2320110166.00000000012C6000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000002.2377038945.0000000001354000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2298375362.00000000012F5000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2336933688.000000000133D000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2369474716.0000000001354000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2336790976.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2336790976.0000000001354000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2293140651.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2297990501.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: tPSrcPbmRe.exe, 00000000.00000003.2267092336.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2271074155.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api( |
Source: tPSrcPbmRe.exe, 00000000.00000002.2377038945.0000000001354000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2369474716.0000000001354000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2336790976.0000000001354000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api) |
Source: tPSrcPbmRe.exe, 00000000.00000003.2245238274.0000000001331000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apiBy |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apic |
Source: tPSrcPbmRe.exe, 00000000.00000003.2320110166.00000000012C6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apire |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apiy |
Source: tPSrcPbmRe.exe, 00000000.00000003.2267092336.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2271074155.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/d |
Source: tPSrcPbmRe.exe, 00000000.00000002.2377002468.00000000012EE000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: tPSrcPbmRe.exe, 00000000.00000003.2320307864.00000000012F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piH |
Source: tPSrcPbmRe.exe, 00000000.00000003.2267092336.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2271074155.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piP |
Source: tPSrcPbmRe.exe, 00000000.00000003.2320307864.00000000012F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/s |
Source: tPSrcPbmRe.exe, 00000000.00000003.2267092336.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2271074155.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2293140651.00000000012EA000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2297990501.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/api |
Source: tPSrcPbmRe.exe, 00000000.00000003.2245238274.0000000001331000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/api8 |
Source: tPSrcPbmRe.exe, 00000000.00000002.2377038945.000000000133F000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2336933688.000000000133D000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2336790976.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2375660843.000000000133F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/apiWdtPWdtP |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2223120012.000000000132F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2223120012.000000000132F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2223120012.000000000132F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2223120012.000000000132F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: tPSrcPbmRe.exe, 00000000.00000003.2223120012.000000000132F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2375411067.00000000012A6000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000002.2376803403.00000000012A6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198657134.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowe |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2198759288.00000000012AD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2271122226.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: tPSrcPbmRe.exe, 00000000.00000003.2271122226.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: tPSrcPbmRe.exe, 00000000.00000003.2221974377.0000000005B1A000.00000004.00000800.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221810075.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2271010290.0000000005BDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.or |
Source: tPSrcPbmRe.exe, 00000000.00000003.2271010290.0000000005BDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: tPSrcPbmRe.exe, 00000000.00000003.2271122226.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle |
Source: tPSrcPbmRe.exe, 00000000.00000003.2271122226.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ |
Source: tPSrcPbmRe.exe, 00000000.00000003.2271122226.0000000005DFD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: tPSrcPbmRe.exe, 00000000.00000003.2198601582.0000000001340000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001336000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: tPSrcPbmRe.exe, 00000000.00000003.2177424761.0000000001330000.00000004.00000020.00020000.00000000.sdmp, tPSrcPbmRe.exe, 00000000.00000003.2221021952.00000000012ED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: AD8358 second address: AD8362 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C521B4 second address: C521BE instructions: 0x00000000 rdtsc 0x00000002 jno 00007F9C81394BF6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C45416 second address: C4543B instructions: 0x00000000 rdtsc 0x00000002 jo 00007F9C80FB5666h 0x00000008 jmp 00007F9C80FB5673h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jng 00007F9C80FB566Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C51535 second address: C51539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C51539 second address: C5154B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB566Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C5154B second address: C5155E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 js 00007F9C81394BF6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C5155E second address: C51562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C51562 second address: C51566 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C51AEE second address: C51AF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C51AF8 second address: C51B06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C51B06 second address: C51B16 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F9C80FB5666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C51B16 second address: C51B1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53443 second address: C53447 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53447 second address: C5344D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C5344D second address: C53452 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53452 second address: C534BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 add dword ptr [esp], 5B100C25h 0x0000000e call 00007F9C81394C07h 0x00000013 mov dword ptr [ebp+122D34AFh], eax 0x00000019 pop esi 0x0000001a push 00000003h 0x0000001c sub ecx, dword ptr [ebp+1244A36Eh] 0x00000022 push 00000000h 0x00000024 cmc 0x00000025 pushad 0x00000026 add ax, 8B9Eh 0x0000002b mov di, 4100h 0x0000002f popad 0x00000030 push 00000003h 0x00000032 cmc 0x00000033 push D6AFA2B8h 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b jmp 00007F9C81394C04h 0x00000040 jnc 00007F9C81394BF6h 0x00000046 popad 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C534BA second address: C53529 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5677h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 16AFA2B8h 0x00000010 pushad 0x00000011 or edi, 2CFC2A86h 0x00000017 mov si, D980h 0x0000001b popad 0x0000001c lea ebx, dword ptr [ebp+1244F31Ah] 0x00000022 push 00000000h 0x00000024 push esi 0x00000025 call 00007F9C80FB5668h 0x0000002a pop esi 0x0000002b mov dword ptr [esp+04h], esi 0x0000002f add dword ptr [esp+04h], 00000019h 0x00000037 inc esi 0x00000038 push esi 0x00000039 ret 0x0000003a pop esi 0x0000003b ret 0x0000003c mov edi, 224C83DAh 0x00000041 mov edx, dword ptr [ebp+122D25C6h] 0x00000047 push eax 0x00000048 push eax 0x00000049 push edx 0x0000004a push eax 0x0000004b push edx 0x0000004c jmp 00007F9C80FB566Ah 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53529 second address: C5352F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C5352F second address: C53539 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C536AB second address: C536B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C536B1 second address: C536B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C5375D second address: C5377B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C5377B second address: C53781 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53781 second address: C537AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 pop edx 0x00000009 popad 0x0000000a nop 0x0000000b xor esi, 6208B49Dh 0x00000011 push 00000000h 0x00000013 mov ecx, dword ptr [ebp+122D3865h] 0x00000019 call 00007F9C81394BF9h 0x0000001e push ecx 0x0000001f push eax 0x00000020 push edx 0x00000021 jnc 00007F9C81394BF6h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C5387E second address: C53884 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53884 second address: C538A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 ja 00007F9C81394BF6h 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jns 00007F9C81394BF6h 0x0000001a pushad 0x0000001b popad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C538A1 second address: C538B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C80FB5671h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C538B6 second address: C538BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C538BA second address: C538F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jnc 00007F9C80FB566Eh 0x00000012 mov eax, dword ptr [eax] 0x00000014 je 00007F9C80FB5685h 0x0000001a pushad 0x0000001b jmp 00007F9C80FB5677h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C538F6 second address: C53915 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp+04h], eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007F9C81394BFCh 0x00000011 jne 00007F9C81394BF6h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53915 second address: C53951 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5674h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a movzx ecx, di 0x0000000d lea ebx, dword ptr [ebp+1244F32Eh] 0x00000013 mov dword ptr [ebp+122D2477h], eax 0x00000019 or edx, dword ptr [ebp+122D2848h] 0x0000001f xchg eax, ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F9C80FB566Bh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C53951 second address: C53957 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C72DBF second address: C72DC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C72DC7 second address: C72DCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C72EF1 second address: C72EF7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C73056 second address: C7306C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007F9C81394BF6h 0x00000010 jns 00007F9C81394BF6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7306C second address: C73072 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C731AE second address: C731B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C73494 second address: C7349E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7349E second address: C734A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C734A4 second address: C734BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F9C80FB5674h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C739A9 second address: C739B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F9C81394BF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C739B3 second address: C739B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C739B7 second address: C739CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C81394BFAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jbe 00007F9C81394BFCh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C739CF second address: C739DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 js 00007F9C80FB5666h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C739DD second address: C739E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C73B4E second address: C73B54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C73B54 second address: C73B5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C73B5C second address: C73B61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C73B61 second address: C73B66 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C4C13C second address: C4C170 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5677h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c jmp 00007F9C80FB5676h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C73CA7 second address: C73CDA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F9C81394BFEh 0x00000010 jmp 00007F9C81394BFAh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7425E second address: C7427B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F9C80FB5674h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7497A second address: C7498F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F9C81394BFFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A618 second address: C7A61E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A61E second address: C7A634 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 js 00007F9C81394BF6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A7A5 second address: C7A7AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A7AA second address: C7A7AF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A7AF second address: C7A7D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a jmp 00007F9C80FB566Dh 0x0000000f pop edx 0x00000010 pop edx 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 push eax 0x00000016 push edx 0x00000017 jc 00007F9C80FB566Ch 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A7D6 second address: C7A7DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A7DA second address: C7A802 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9C80FB566Bh 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [eax] 0x0000000f push esi 0x00000010 push edx 0x00000011 jne 00007F9C80FB5666h 0x00000017 pop edx 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d push esi 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A802 second address: C7A806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A8B9 second address: C7A8BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7A8BD second address: C7A8CF instructions: 0x00000000 rdtsc 0x00000002 je 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007F9C81394BF6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7EFD7 second address: C7EFE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 jc 00007F9C80FB566Eh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7EFE8 second address: C7F02D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C81394C02h 0x00000009 jmp 00007F9C81394C00h 0x0000000e push eax 0x0000000f push edx 0x00000010 jng 00007F9C81394BF6h 0x00000016 jmp 00007F9C81394C07h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7F02D second address: C7F031 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7F2FD second address: C7F303 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C7F303 second address: C7F307 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82FB1 second address: C82FB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82FB5 second address: C82FBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C830DD second address: C830E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C830E1 second address: C830FD instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F9C80FB5666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F9C80FB566Fh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C832FE second address: C83303 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8362B second address: C83635 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F9C80FB5666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C83635 second address: C83648 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C81394BFFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C83750 second address: C83754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C84358 second address: C843A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C06h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F9C81394BF8h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000015h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 push esi 0x00000028 mov si, dx 0x0000002b pop esi 0x0000002c mov esi, eax 0x0000002e xchg eax, ebx 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 push ecx 0x00000033 pop ecx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C868E2 second address: C8693F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F9C80FB5668h 0x0000000c popad 0x0000000d mov dword ptr [esp], eax 0x00000010 mov edi, dword ptr [ebp+122D1D51h] 0x00000016 push 00000000h 0x00000018 push edi 0x00000019 pushad 0x0000001a and si, 17D6h 0x0000001f mov ecx, 53D1D7F1h 0x00000024 popad 0x00000025 pop edi 0x00000026 push 00000000h 0x00000028 xor edi, dword ptr [ebp+122D3951h] 0x0000002e xchg eax, ebx 0x0000002f jl 00007F9C80FB5676h 0x00000035 jmp 00007F9C80FB5670h 0x0000003a push eax 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007F9C80FB5673h 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8712C second address: C8713E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F9C81394BF6h 0x0000000a popad 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C88076 second address: C8807B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C88334 second address: C88352 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jg 00007F9C81394BF6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push ecx 0x0000000e pushad 0x0000000f jmp 00007F9C81394BFDh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8713E second address: C8715A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5677h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8807B second address: C88081 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C88081 second address: C88085 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C898C0 second address: C89902 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007F9C81394BF8h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 00000017h 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 push 00000000h 0x00000025 jmp 00007F9C81394BFDh 0x0000002a push 00000000h 0x0000002c mov si, di 0x0000002f push eax 0x00000030 push eax 0x00000031 push edx 0x00000032 push esi 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C89902 second address: C89907 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8BDE8 second address: C8BDEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8A12C second address: C8A130 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C3E7AA second address: C3E7AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8C43C second address: C8C440 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C90132 second address: C90136 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C90136 second address: C9013A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8F206 second address: C8F20F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8F20F second address: C8F213 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8F213 second address: C8F224 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007F9C81394BF6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C91033 second address: C91039 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8F224 second address: C8F284 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 ja 00007F9C81394C05h 0x0000000e push dword ptr fs:[00000000h] 0x00000015 mov ebx, dword ptr [ebp+122D2954h] 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 mov ebx, dword ptr [ebp+122D267Bh] 0x00000028 movsx ebx, si 0x0000002b mov eax, dword ptr [ebp+122D001Dh] 0x00000031 push FFFFFFFFh 0x00000033 movsx ebx, bx 0x00000036 push eax 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007F9C81394C08h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C902DA second address: C902E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C91039 second address: C910C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007F9C81394BF8h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 0000001Ch 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 and edi, dword ptr [ebp+12457C52h] 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push esi 0x00000030 call 00007F9C81394BF8h 0x00000035 pop esi 0x00000036 mov dword ptr [esp+04h], esi 0x0000003a add dword ptr [esp+04h], 0000001Ch 0x00000042 inc esi 0x00000043 push esi 0x00000044 ret 0x00000045 pop esi 0x00000046 ret 0x00000047 jmp 00007F9C81394C05h 0x0000004c push edi 0x0000004d add dword ptr [ebp+1244F8B0h], edi 0x00000053 pop ebx 0x00000054 push eax 0x00000055 pushad 0x00000056 jmp 00007F9C81394BFDh 0x0000005b push esi 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C91FF5 second address: C91FFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C91FFA second address: C92001 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C912F7 second address: C912FD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C92FF8 second address: C93018 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F9C81394C09h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C92244 second address: C92254 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pushad 0x00000008 je 00007F9C80FB5666h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9582E second address: C95838 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C95838 second address: C9584E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C80FB5672h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C958F0 second address: C958F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C958F4 second address: C958FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C97594 second address: C9759B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9759B second address: C97606 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 jmp 00007F9C80FB5675h 0x0000000d push 00000000h 0x0000000f jns 00007F9C80FB567Eh 0x00000015 push 00000000h 0x00000017 or dword ptr [ebp+1244A4D6h], edx 0x0000001d push edi 0x0000001e pushad 0x0000001f and ch, 0000004Eh 0x00000022 jmp 00007F9C80FB5674h 0x00000027 popad 0x00000028 pop edi 0x00000029 xchg eax, esi 0x0000002a pushad 0x0000002b pushad 0x0000002c jne 00007F9C80FB5666h 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C98674 second address: C98686 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C98686 second address: C9868B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9972B second address: C99732 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9A77F second address: C9A785 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9A785 second address: C9A789 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9A789 second address: C9A78D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9C884 second address: C9C89E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9C81394C05h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9D9FF second address: C9DA03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9DA03 second address: C9DA1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C81394C06h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9FA43 second address: C9FA48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9FA48 second address: C9FA52 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9C81394BFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9992F second address: C99933 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C99933 second address: C99947 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C00h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C99947 second address: C99951 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9A8A5 second address: C9A8AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9A8AC second address: C9A91D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f pop ebx 0x00000010 nop 0x00000011 push dword ptr fs:[00000000h] 0x00000018 mov edi, dword ptr [ebp+1247BFA5h] 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 push 00000000h 0x00000027 push ebp 0x00000028 call 00007F9C80FB5668h 0x0000002d pop ebp 0x0000002e mov dword ptr [esp+04h], ebp 0x00000032 add dword ptr [esp+04h], 00000019h 0x0000003a inc ebp 0x0000003b push ebp 0x0000003c ret 0x0000003d pop ebp 0x0000003e ret 0x0000003f mov ebx, esi 0x00000041 mov eax, dword ptr [ebp+122D14E9h] 0x00000047 pushad 0x00000048 xor bh, 00000000h 0x0000004b mov esi, dword ptr [ebp+122D39A5h] 0x00000051 popad 0x00000052 push FFFFFFFFh 0x00000054 mov dword ptr [ebp+122D2719h], eax 0x0000005a add ebx, 6D291D72h 0x00000060 push eax 0x00000061 pushad 0x00000062 je 00007F9C80FB566Ch 0x00000068 push eax 0x00000069 push edx 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9DBB7 second address: C9DBBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C988D7 second address: C988DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9EA88 second address: C9EA8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9EA8C second address: C9EA92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9EB72 second address: C9EB8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F9C81394C06h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9EB8F second address: C9EB93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9FBC1 second address: C9FC09 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C08h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F9C81394BFDh 0x0000000e popad 0x0000000f push eax 0x00000010 jbe 00007F9C81394C17h 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F9C81394C05h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C9FC09 second address: C9FC0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CA61B5 second address: CA61C1 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F9C81394BFEh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CA61C1 second address: CA61CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F9C80FB566Eh 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CA647C second address: CA6496 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F9C81394BFAh 0x00000008 js 00007F9C81394BF6h 0x0000000e pop ecx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CA8046 second address: CA804D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CA804D second address: CA8053 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C40298 second address: C402C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5673h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jmp 00007F9C80FB5676h 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C4A4F2 second address: C4A525 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 jl 00007F9C81394C27h 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F9C81394C06h 0x00000013 jmp 00007F9C81394BFFh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADA76 second address: CADA7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADA7B second address: CADA81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADA81 second address: CADA85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADB2B second address: CADB31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADB31 second address: CADB47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB566Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADB47 second address: CADB7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push esi 0x00000007 pop esi 0x00000008 jmp 00007F9C81394C09h 0x0000000d popad 0x0000000e popad 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 jbe 00007F9C81394C04h 0x00000019 pushad 0x0000001a jg 00007F9C81394BF6h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADB7D second address: CADB89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [eax] 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CADB89 second address: CADB8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB43C3 second address: CB43C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB43C9 second address: CB43CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB43CE second address: CB43D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB3831 second address: CB3839 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB3C01 second address: CB3C05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB3C05 second address: CB3C0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB3D1B second address: CB3D21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB3D21 second address: CB3D2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F9C81394BF6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB662C second address: CB6632 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB6632 second address: CB6653 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F9C81394C03h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c jp 00007F9C81394BF6h 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB6653 second address: CB6659 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB6659 second address: CB665D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9BF5 second address: CB9C00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9C00 second address: CB9C04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9C04 second address: CB9C1B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5671h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9C1B second address: CB9C23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9C23 second address: CB9C27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9C27 second address: CB9C39 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007F9C81394BF6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81753 second address: C81757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81757 second address: C8181B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C06h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d jp 00007F9C81394BF6h 0x00000013 jmp 00007F9C81394BFFh 0x00000018 popad 0x00000019 jmp 00007F9C81394C04h 0x0000001e popad 0x0000001f nop 0x00000020 push 00000000h 0x00000022 push edx 0x00000023 call 00007F9C81394BF8h 0x00000028 pop edx 0x00000029 mov dword ptr [esp+04h], edx 0x0000002d add dword ptr [esp+04h], 0000001Ch 0x00000035 inc edx 0x00000036 push edx 0x00000037 ret 0x00000038 pop edx 0x00000039 ret 0x0000003a jmp 00007F9C81394C00h 0x0000003f lea eax, dword ptr [ebp+1247D4D6h] 0x00000045 push 00000000h 0x00000047 push ecx 0x00000048 call 00007F9C81394BF8h 0x0000004d pop ecx 0x0000004e mov dword ptr [esp+04h], ecx 0x00000052 add dword ptr [esp+04h], 00000015h 0x0000005a inc ecx 0x0000005b push ecx 0x0000005c ret 0x0000005d pop ecx 0x0000005e ret 0x0000005f call 00007F9C81394C02h 0x00000064 mov dword ptr [ebp+122D2FA8h], ecx 0x0000006a pop edx 0x0000006b nop 0x0000006c pushad 0x0000006d push eax 0x0000006e push edx 0x0000006f jnc 00007F9C81394BF6h 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81A17 second address: C81A1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81A1B second address: C81A24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81D93 second address: C81D97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81D97 second address: C81D9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81D9D second address: C81DA1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81E94 second address: C81E9E instructions: 0x00000000 rdtsc 0x00000002 ja 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81E9E second address: C81EA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81EA4 second address: C81EFF instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 2484F71Ah 0x00000013 push 00000000h 0x00000015 push eax 0x00000016 call 00007F9C81394BF8h 0x0000001b pop eax 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 add dword ptr [esp+04h], 00000016h 0x00000028 inc eax 0x00000029 push eax 0x0000002a ret 0x0000002b pop eax 0x0000002c ret 0x0000002d pushad 0x0000002e call 00007F9C81394BFAh 0x00000033 mov dl, DEh 0x00000035 pop ebx 0x00000036 ja 00007F9C81394BFCh 0x0000003c popad 0x0000003d call 00007F9C81394BF9h 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 push eax 0x00000047 pop eax 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81EFF second address: C81F05 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C81F05 second address: C81F40 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 ja 00007F9C81394C08h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 jmp 00007F9C81394C00h 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82049 second address: C8204F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8204F second address: C82053 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C820BF second address: C820CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C820CB second address: C820CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C820CF second address: C820D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82189 second address: C8218E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8218E second address: C82199 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F9C80FB5666h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82199 second address: C821B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007F9C81394BFAh 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C821B5 second address: C821BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C821BB second address: C821CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C81394BFFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C821CE second address: C821D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C821D2 second address: C821F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jg 00007F9C81394C00h 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push ebx 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8227E second address: C822B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5675h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F9C80FB5676h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C8276C second address: C82770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82770 second address: C82776 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82A86 second address: C82ACA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push ebx 0x0000000f jo 00007F9C81394BF6h 0x00000015 pop ebx 0x00000016 pop eax 0x00000017 mov eax, dword ptr [eax] 0x00000019 pushad 0x0000001a jmp 00007F9C81394BFEh 0x0000001f push eax 0x00000020 push edx 0x00000021 jne 00007F9C81394BF6h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82ACA second address: C82ACE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82ACE second address: C82AE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007F9C81394BFCh 0x00000013 js 00007F9C81394BF6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82B60 second address: C82B66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82B66 second address: C82B73 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82B73 second address: C82BF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ebp 0x0000000a call 00007F9C80FB5668h 0x0000000f pop ebp 0x00000010 mov dword ptr [esp+04h], ebp 0x00000014 add dword ptr [esp+04h], 0000001Bh 0x0000001c inc ebp 0x0000001d push ebp 0x0000001e ret 0x0000001f pop ebp 0x00000020 ret 0x00000021 clc 0x00000022 lea eax, dword ptr [ebp+1247D51Ah] 0x00000028 push 00000000h 0x0000002a push edi 0x0000002b call 00007F9C80FB5668h 0x00000030 pop edi 0x00000031 mov dword ptr [esp+04h], edi 0x00000035 add dword ptr [esp+04h], 0000001Ah 0x0000003d inc edi 0x0000003e push edi 0x0000003f ret 0x00000040 pop edi 0x00000041 ret 0x00000042 mov cx, 864Bh 0x00000046 nop 0x00000047 jmp 00007F9C80FB566Bh 0x0000004c push eax 0x0000004d push eax 0x0000004e push edx 0x0000004f push eax 0x00000050 push edx 0x00000051 jmp 00007F9C80FB5676h 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82BF1 second address: C82BFB instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82BFB second address: C82C61 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F9C80FB5674h 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c jmp 00007F9C80FB5677h 0x00000011 lea eax, dword ptr [ebp+1247D4D6h] 0x00000017 push 00000000h 0x00000019 push edi 0x0000001a call 00007F9C80FB5668h 0x0000001f pop edi 0x00000020 mov dword ptr [esp+04h], edi 0x00000024 add dword ptr [esp+04h], 0000001Ah 0x0000002c inc edi 0x0000002d push edi 0x0000002e ret 0x0000002f pop edi 0x00000030 ret 0x00000031 mov dword ptr [ebp+122D1DCCh], ecx 0x00000037 nop 0x00000038 pushad 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C82C61 second address: C82C65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9F3A second address: CB9F57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F9C80FB566Bh 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jl 00007F9C80FB5666h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9F57 second address: CB9F80 instructions: 0x00000000 rdtsc 0x00000002 js 00007F9C81394BF6h 0x00000008 jp 00007F9C81394BF6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F9C81394C03h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CB9F80 second address: CB9F90 instructions: 0x00000000 rdtsc 0x00000002 je 00007F9C80FB5666h 0x00000008 js 00007F9C80FB5666h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBA348 second address: CBA352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F9C81394BF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBA352 second address: CBA35B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBA35B second address: CBA361 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBA51C second address: CBA521 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C40294 second address: C40298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF43C second address: CBF445 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF445 second address: CBF449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF449 second address: CBF46E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5671h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d je 00007F9C80FB5668h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF46E second address: CBF474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF5E8 second address: CBF60B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007F9C80FB5666h 0x0000000f jmp 00007F9C80FB5674h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF60B second address: CBF616 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF76A second address: CBF7A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5677h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c jmp 00007F9C80FB5678h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF7A0 second address: CBF7A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBFD55 second address: CBFD5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBFFFD second address: CC0003 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC0003 second address: CC0007 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC0007 second address: CC000B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC000B second address: CC0038 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F9C80FB5666h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f ja 00007F9C80FB5666h 0x00000015 push edi 0x00000016 pop edi 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a pop esi 0x0000001b push ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F9C80FB566Dh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC0038 second address: CC003C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC078D second address: CC07AC instructions: 0x00000000 rdtsc 0x00000002 jno 00007F9C80FB5666h 0x00000008 jmp 00007F9C80FB5672h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC07AC second address: CC07F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007F9C81394C08h 0x00000010 jmp 00007F9C81394C03h 0x00000015 popad 0x00000016 pushad 0x00000017 jmp 00007F9C81394BFDh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC07F3 second address: CC07FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF019 second address: CBF01E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CBF01E second address: CBF06A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F9C80FB5666h 0x0000000a popad 0x0000000b pushad 0x0000000c jng 00007F9C80FB5666h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 jmp 00007F9C80FB566Bh 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c push eax 0x0000001d jno 00007F9C80FB567Eh 0x00000023 pushad 0x00000024 push eax 0x00000025 pop eax 0x00000026 jg 00007F9C80FB5666h 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C3CC2A second address: C3CC65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F9C81394C05h 0x0000000a jnp 00007F9C81394C15h 0x00000010 jmp 00007F9C81394C09h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CC6C72 second address: CC6C97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB566Fh 0x00000009 pop edi 0x0000000a jnc 00007F9C80FB566Eh 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC3F9 second address: CCC3FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC3FF second address: CCC403 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC403 second address: CCC409 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC409 second address: CCC41A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F9C80FB566Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC41A second address: CCC42E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F9C81394BFDh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC42E second address: CCC45D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F9C80FB566Ch 0x0000000f push eax 0x00000010 jmp 00007F9C80FB5676h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC45D second address: CCC462 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCB14C second address: CCB17A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edi 0x00000006 jmp 00007F9C80FB566Fh 0x0000000b pop edi 0x0000000c jns 00007F9C80FB566Eh 0x00000012 popad 0x00000013 pushad 0x00000014 jbe 00007F9C80FB566Ch 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCB2E2 second address: CCB2E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCB6EE second address: CCB6F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCAE88 second address: CCAE8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCC102 second address: CCC10C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CCF05B second address: CCF077 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F9C81394BF6h 0x0000000a jmp 00007F9C81394C02h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD1D3E second address: CD1D46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD1ED9 second address: CD1EFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F9C81394BF6h 0x0000000a jmp 00007F9C81394C03h 0x0000000f popad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD1EFA second address: CD1F00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD1F00 second address: CD1F06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD206F second address: CD2073 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD21D1 second address: CD21D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C43825 second address: C43840 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5677h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C43840 second address: C43846 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C41D17 second address: C41D1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C41D1B second address: C41D2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F9C81394BF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C41D2A second address: C41D40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5670h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD8CCE second address: CD8CE0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD8CE0 second address: CD8CE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD8CE6 second address: CD8CEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C825A6 second address: C825EC instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9C80FB5666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e mov dword ptr [ebp+122D1E75h], edi 0x00000014 push 00000004h 0x00000016 push 00000000h 0x00000018 push edi 0x00000019 call 00007F9C80FB5668h 0x0000001e pop edi 0x0000001f mov dword ptr [esp+04h], edi 0x00000023 add dword ptr [esp+04h], 0000001Dh 0x0000002b inc edi 0x0000002c push edi 0x0000002d ret 0x0000002e pop edi 0x0000002f ret 0x00000030 xor di, A4D6h 0x00000035 nop 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 push ebx 0x0000003a pop ebx 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: C825EC second address: C82609 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C06h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD94EC second address: CD94F2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD94F2 second address: CD94F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CD94F8 second address: CD9514 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5675h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDA08E second address: CDA09C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 pop eax 0x00000009 popad 0x0000000a push ebx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDF0AA second address: CDF0BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB566Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDF0BB second address: CDF0C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDF0C1 second address: CDF0CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE334 second address: CDE33B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE33B second address: CDE340 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE340 second address: CDE346 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE657 second address: CDE67F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5670h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9C80FB566Fh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE67F second address: CDE683 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE7E0 second address: CDE800 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9C80FB5676h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE800 second address: CDE811 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e push eax 0x0000000f pop eax 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE811 second address: CDE817 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE817 second address: CDE833 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C81394C08h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE833 second address: CDE839 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CDE975 second address: CDE979 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE18B4 second address: CE18B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE18B9 second address: CE18D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9C81394C04h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE1E1A second address: CE1E1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE1E1E second address: CE1E66 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jnc 00007F9C81394BF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jl 00007F9C81394BF6h 0x00000015 jmp 00007F9C81394BFAh 0x0000001a popad 0x0000001b pushad 0x0000001c jmp 00007F9C81394C05h 0x00000021 pushad 0x00000022 popad 0x00000023 jno 00007F9C81394BF6h 0x00000029 popad 0x0000002a push ecx 0x0000002b jo 00007F9C81394BF6h 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE1E66 second address: CE1EA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007F9C80FB5674h 0x0000000c push ebx 0x0000000d jmp 00007F9C80FB5674h 0x00000012 js 00007F9C80FB5666h 0x00000018 pop ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b jns 00007F9C80FB5666h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEB930 second address: CEB934 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEB934 second address: CEB93A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEB93A second address: CEB966 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F9C81394BFBh 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007F9C81394C07h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE9A05 second address: CE9A16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007F9C80FB5666h 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE9A16 second address: CE9A45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F9C81394C01h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE9A45 second address: CE9A4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE9D5E second address: CE9D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CE9D64 second address: CE9D68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEA071 second address: CEA07F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F9C81394BFCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEA07F second address: CEA09E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 jmp 00007F9C80FB5674h 0x0000000d pushad 0x0000000e popad 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEA5C8 second address: CEA5CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEAE06 second address: CEAE0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEB60C second address: CEB63A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C06h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F9C81394C04h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CEB63A second address: CEB63E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF02C7 second address: CF02CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF02CD second address: CF02D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF02D1 second address: CF02D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF35A7 second address: CF35AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF35AD second address: CF35B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF35B1 second address: CF35B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF39F5 second address: CF39FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF39FB second address: CF39FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF39FF second address: CF3A07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF3A07 second address: CF3A0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF3A0B second address: CF3A1F instructions: 0x00000000 rdtsc 0x00000002 je 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007F9C81394BF6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF3A1F second address: CF3A23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF3B43 second address: CF3B4E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F9C81394BF6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CF3E30 second address: CF3E35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFDBA6 second address: CFDBAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFBC8B second address: CFBCAE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5677h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b js 00007F9C80FB5666h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC163 second address: CFC169 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC451 second address: CFC457 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC457 second address: CFC45D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC45D second address: CFC463 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC463 second address: CFC46A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC46A second address: CFC477 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007F9C80FB5666h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC70F second address: CFC715 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC715 second address: CFC724 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007F9C80FB5666h 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC724 second address: CFC728 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC728 second address: CFC72E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC72E second address: CFC745 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C81394C03h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFC9D0 second address: CFC9DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F9C80FB5666h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFCB55 second address: CFCB68 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F9C81394BFCh 0x00000008 push eax 0x00000009 push eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFD9E0 second address: CFD9E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFD9E4 second address: CFDA17 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F9C81394BFBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jo 00007F9C81394BF8h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F9C81394C06h 0x0000001a push esi 0x0000001b pop esi 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFB7FC second address: CFB802 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFB802 second address: CFB823 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F9C81394BF6h 0x00000008 jmp 00007F9C81394C07h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFB823 second address: CFB89D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pushad 0x00000006 popad 0x00000007 je 00007F9C80FB5666h 0x0000000d jnp 00007F9C80FB5666h 0x00000013 popad 0x00000014 pushad 0x00000015 jnl 00007F9C80FB5666h 0x0000001b ja 00007F9C80FB5666h 0x00000021 jmp 00007F9C80FB5679h 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 pushad 0x0000002a jnl 00007F9C80FB5680h 0x00000030 pushad 0x00000031 jmp 00007F9C80FB5679h 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: CFB89D second address: CFB8AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D034F0 second address: D03513 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB566Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F9C80FB566Ah 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 push edx 0x00000014 pop edx 0x00000015 push ecx 0x00000016 jns 00007F9C80FB5666h 0x0000001c pop ecx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D03513 second address: D0351C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0351C second address: D03522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D031DE second address: D031EE instructions: 0x00000000 rdtsc 0x00000002 js 00007F9C81394BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0FE2D second address: D0FE31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0FE31 second address: D0FE35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0FE35 second address: D0FE3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0FE3B second address: D0FE41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0FE41 second address: D0FE45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0F838 second address: D0F83E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D0F83E second address: D0F849 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 je 00007F9C80FB5666h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D11D2F second address: D11D38 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D11A88 second address: D11A8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D19BD4 second address: D19C29 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9C81394BFBh 0x00000008 jne 00007F9C81394BF6h 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007F9C81394BFEh 0x00000017 pushad 0x00000018 popad 0x00000019 jmp 00007F9C81394BFCh 0x0000001e popad 0x0000001f pop edx 0x00000020 pop eax 0x00000021 push eax 0x00000022 push edx 0x00000023 jns 00007F9C81394C04h 0x00000029 push eax 0x0000002a push edx 0x0000002b je 00007F9C81394BF6h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D19C29 second address: D19C31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D1E4CA second address: D1E4D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D1E4D0 second address: D1E4D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D1E4D6 second address: D1E4DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D1E4DB second address: D1E4EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F9C80FB5666h 0x0000000a jg 00007F9C80FB5666h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D1E4EB second address: D1E50F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jp 00007F9C81394BFAh 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jp 00007F9C81394BFEh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D1E50F second address: D1E51B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007F9C80FB5666h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D224D9 second address: D224E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D224E4 second address: D224EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F9C80FB5666h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D23C5B second address: D23C7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 ja 00007F9C81394BF6h 0x0000000c jmp 00007F9C81394C07h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2B10F second address: D2B113 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2B113 second address: D2B117 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2B117 second address: D2B136 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F9C80FB5666h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F9C80FB566Dh 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2B136 second address: D2B13A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F62E second address: D2F634 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F7A7 second address: D2F7B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F9C81394BF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F7B1 second address: D2F7B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F916 second address: D2F91A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F91A second address: D2F920 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F920 second address: D2F92A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F92A second address: D2F930 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2F930 second address: D2F934 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D2FF6F second address: D2FF73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D300EC second address: D30105 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F9C81394BFCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ecx 0x0000000c pushad 0x0000000d popad 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30105 second address: D3010B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D3010B second address: D3010F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D3010F second address: D3011C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F9C80FB5666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D3011C second address: D30122 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B14 second address: D30B21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jc 00007F9C80FB5666h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B21 second address: D30B2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 js 00007F9C81394BF6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B2D second address: D30B43 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F9C80FB5666h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e je 00007F9C80FB5666h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B43 second address: D30B47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B47 second address: D30B5F instructions: 0x00000000 rdtsc 0x00000002 jg 00007F9C80FB5666h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jne 00007F9C80FB566Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B5F second address: D30B67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B67 second address: D30B80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5673h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D30B80 second address: D30BAA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F9C81394C06h 0x0000000a jne 00007F9C81394BF6h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jng 00007F9C81394BF6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D3E539 second address: D3E548 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB566Ah 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D3E548 second address: D3E54F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D51870 second address: D51878 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D51878 second address: D51887 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9C81394BF6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D5482E second address: D5483D instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F9C80FB5666h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D5483D second address: D54843 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D5441B second address: D5442F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB566Fh 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D69140 second address: D6916E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C81394C09h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jmp 00007F9C81394BFAh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6916E second address: D6917D instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F9C80FB5666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6917D second address: D69185 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D69185 second address: D691A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5675h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68800 second address: D6881B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 jmp 00007F9C81394C04h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6881B second address: D68823 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68992 second address: D689B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C04h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jg 00007F9C81394BFCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68C81 second address: D68C85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68C85 second address: D68C8B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68DCD second address: D68DE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9C80FB5674h 0x00000009 pop ecx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68DE9 second address: D68E09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007F9C81394C07h 0x0000000b push esi 0x0000000c pop esi 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E09 second address: D68E29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C80FB5676h 0x00000009 jnl 00007F9C80FB5666h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E29 second address: D68E2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E2D second address: D68E37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E37 second address: D68E3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E3D second address: D68E41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E41 second address: D68E63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9C81394C06h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E63 second address: D68E69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E69 second address: D68E83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9C81394C02h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E83 second address: D68E87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E87 second address: D68E8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E8D second address: D68E92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D68E92 second address: D68E9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6BC39 second address: D6BC45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6BC45 second address: D6BC5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6BDCF second address: D6BDD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6BE5C second address: D6BE90 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9C81394C06h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6C158 second address: D6C167 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jbe 00007F9C80FB566Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6C167 second address: D6C1D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007F9C81394BF8h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000016h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 mov edx, esi 0x00000024 mov dword ptr [ebp+122D29FCh], eax 0x0000002a push dword ptr [ebp+122D34D8h] 0x00000030 push 00000000h 0x00000032 push edx 0x00000033 call 00007F9C81394BF8h 0x00000038 pop edx 0x00000039 mov dword ptr [esp+04h], edx 0x0000003d add dword ptr [esp+04h], 00000014h 0x00000045 inc edx 0x00000046 push edx 0x00000047 ret 0x00000048 pop edx 0x00000049 ret 0x0000004a jo 00007F9C81394BFBh 0x00000050 mov edx, 16B2EC84h 0x00000055 mov dl, 1Fh 0x00000057 call 00007F9C81394BF9h 0x0000005c push esi 0x0000005d push eax 0x0000005e push edx 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6C1D2 second address: D6C1D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6C1D6 second address: D6C20B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b jmp 00007F9C81394C08h 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 pushad 0x00000015 push eax 0x00000016 push esi 0x00000017 pop esi 0x00000018 pop eax 0x00000019 push ecx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6C20B second address: D6C22F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 push ecx 0x00000009 jbe 00007F9C80FB566Ch 0x0000000f je 00007F9C80FB5666h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a push edx 0x0000001b pushad 0x0000001c jno 00007F9C80FB5666h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D6EDBF second address: D6EDC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D70DE1 second address: D70DE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D70DE5 second address: D70DE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D70DE9 second address: D70DEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D70DEF second address: D70DF9 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9C81394BFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: D70DF9 second address: D70E31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 jmp 00007F9C80FB5674h 0x0000000d pushad 0x0000000e popad 0x0000000f pop edi 0x00000010 jmp 00007F9C80FB5675h 0x00000015 push eax 0x00000016 push edx 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D0394 second address: 50D03AF instructions: 0x00000000 rdtsc 0x00000002 call 00007F9C81394C02h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D03AF second address: 50D03F9 instructions: 0x00000000 rdtsc 0x00000002 mov si, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov edx, 33B401E6h 0x00000011 pushfd 0x00000012 jmp 00007F9C80FB5677h 0x00000017 adc ecx, 303B3C6Eh 0x0000001d jmp 00007F9C80FB5679h 0x00000022 popfd 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D03F9 second address: 50D0416 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F9C81394C07h 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D0416 second address: 50D0424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D0424 second address: 50D0428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D0428 second address: 50D0436 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB566Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D0436 second address: 50D043C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50D043C second address: 50D0440 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51006A5 second address: 51006AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51006AB second address: 51006FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, dx 0x00000006 pushfd 0x00000007 jmp 00007F9C80FB5671h 0x0000000c and ax, 4B76h 0x00000011 jmp 00007F9C80FB5671h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F9C80FB5678h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51006FA second address: 5100709 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100709 second address: 510070F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 510070F second address: 5100747 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007F9C81394C06h 0x00000012 xchg eax, ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F9C81394BFAh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100747 second address: 510074B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 510074B second address: 5100751 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100751 second address: 5100787 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB566Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F9C80FB566Bh 0x0000000f xchg eax, ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F9C80FB5675h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100787 second address: 510078D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 510078D second address: 5100791 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100791 second address: 510079F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c mov dl, al 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 510079F second address: 51007E8 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F9C80FB566Dh 0x00000008 sub al, FFFFFFB6h 0x0000000b jmp 00007F9C80FB5671h 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 mov dx, si 0x00000016 popad 0x00000017 mov dword ptr [esp], esi 0x0000001a jmp 00007F9C80FB566Ah 0x0000001f lea eax, dword ptr [ebp-04h] 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F9C80FB566Ah 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51007E8 second address: 51007F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51007F7 second address: 51007FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51007FD second address: 5100886 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F9C81394C04h 0x00000013 add cx, CB98h 0x00000018 jmp 00007F9C81394BFBh 0x0000001d popfd 0x0000001e pushad 0x0000001f mov esi, 0C0121E5h 0x00000024 call 00007F9C81394C02h 0x00000029 pop ecx 0x0000002a popad 0x0000002b popad 0x0000002c push eax 0x0000002d pushad 0x0000002e mov edi, esi 0x00000030 popad 0x00000031 nop 0x00000032 pushad 0x00000033 movsx edi, ax 0x00000036 pushfd 0x00000037 jmp 00007F9C81394BFEh 0x0000003c add esi, 31B3D058h 0x00000042 jmp 00007F9C81394BFBh 0x00000047 popfd 0x00000048 popad 0x00000049 push dword ptr [ebp+08h] 0x0000004c push eax 0x0000004d push edx 0x0000004e push eax 0x0000004f push edx 0x00000050 pushad 0x00000051 popad 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100886 second address: 510088A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 510088A second address: 5100890 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100890 second address: 5100896 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100896 second address: 510089A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51008C1 second address: 51008F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5679h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp-04h], 00000000h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F9C80FB566Dh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51008F1 second address: 5100921 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, eax 0x0000000b jmp 00007F9C81394BFEh 0x00000010 je 00007F9C81394C93h 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100921 second address: 510095A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F9C80FB5673h 0x0000000a or esi, 5B90DC9Eh 0x00000010 jmp 00007F9C80FB5679h 0x00000015 popfd 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 51009FD second address: 5100A01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100A01 second address: 5100A1C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5677h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100A1C second address: 5100A5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9C81394BFFh 0x00000009 xor ax, 8CDEh 0x0000000e jmp 00007F9C81394C09h 0x00000013 popfd 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 leave 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100A5A second address: 5100A60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 5100A60 second address: 50F0008 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C00h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 retn 0004h 0x0000000c nop 0x0000000d cmp eax, 00000000h 0x00000010 setne al 0x00000013 jmp 00007F9C81394BF2h 0x00000015 xor ebx, ebx 0x00000017 test al, 01h 0x00000019 jne 00007F9C81394BF7h 0x0000001b sub esp, 04h 0x0000001e mov dword ptr [esp], 0000000Dh 0x00000025 call 00007F9C859D21EBh 0x0000002a mov edi, edi 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0008 second address: 50F000C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F000C second address: 50F0010 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0010 second address: 50F0016 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0016 second address: 50F001E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, cx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F001E second address: 50F00C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 jmp 00007F9C80FB5678h 0x0000000d push eax 0x0000000e jmp 00007F9C80FB566Bh 0x00000013 xchg eax, ebp 0x00000014 jmp 00007F9C80FB5676h 0x00000019 mov ebp, esp 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F9C80FB566Eh 0x00000022 sbb ecx, 24C674C8h 0x00000028 jmp 00007F9C80FB566Bh 0x0000002d popfd 0x0000002e mov ax, 6A3Fh 0x00000032 popad 0x00000033 sub esp, 2Ch 0x00000036 jmp 00007F9C80FB5672h 0x0000003b xchg eax, ebx 0x0000003c jmp 00007F9C80FB5670h 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 jmp 00007F9C80FB566Dh 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F00C2 second address: 50F00C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F00C8 second address: 50F00CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F00CD second address: 50F0117 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebx 0x00000008 jmp 00007F9C81394C05h 0x0000000d xchg eax, edi 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 pushfd 0x00000014 jmp 00007F9C81394C09h 0x00000019 jmp 00007F9C81394BFBh 0x0000001e popfd 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0117 second address: 50F015B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C80FB5679h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007F9C80FB566Dh 0x00000013 sbb cl, 00000016h 0x00000016 jmp 00007F9C80FB5671h 0x0000001b popfd 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F015B second address: 50F0166 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 xchg eax, edi 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0166 second address: 50F017C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F9C80FB5670h 0x00000009 pop esi 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F017C second address: 50F0182 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0234 second address: 50F029C instructions: 0x00000000 rdtsc 0x00000002 call 00007F9C80FB5672h 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov edi, 00000000h 0x00000010 pushad 0x00000011 call 00007F9C80FB566Ch 0x00000016 mov edx, eax 0x00000018 pop eax 0x00000019 mov bx, B542h 0x0000001d popad 0x0000001e inc ebx 0x0000001f jmp 00007F9C80FB5679h 0x00000024 test al, al 0x00000026 jmp 00007F9C80FB566Eh 0x0000002b je 00007F9C80FB5870h 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 popad 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F029C second address: 50F02B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0325 second address: 50F032B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F032B second address: 50F032F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F032F second address: 50F0333 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0333 second address: 50F0373 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 jmp 00007F9C81394C04h 0x0000000e push eax 0x0000000f jmp 00007F9C81394BFBh 0x00000014 nop 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 call 00007F9C81394C02h 0x0000001d pop ecx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F03E3 second address: 50F042C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 pushfd 0x00000007 jmp 00007F9C80FB566Bh 0x0000000c and si, 51FEh 0x00000011 jmp 00007F9C80FB5679h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a jg 00007F9CF28236DBh 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F9C80FB566Dh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F042C second address: 50F0456 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394C01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007F9C81394C4Fh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F9C81394BFDh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0456 second address: 50F0466 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9C80FB566Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0466 second address: 50F046A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F046A second address: 50F0519 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [ebp-14h], edi 0x0000000b pushad 0x0000000c jmp 00007F9C80FB566Dh 0x00000011 movzx eax, bx 0x00000014 popad 0x00000015 jne 00007F9CF282367Ah 0x0000001b jmp 00007F9C80FB5673h 0x00000020 mov ebx, dword ptr [ebp+08h] 0x00000023 jmp 00007F9C80FB5676h 0x00000028 lea eax, dword ptr [ebp-2Ch] 0x0000002b jmp 00007F9C80FB5670h 0x00000030 xchg eax, esi 0x00000031 jmp 00007F9C80FB5670h 0x00000036 push eax 0x00000037 jmp 00007F9C80FB566Bh 0x0000003c xchg eax, esi 0x0000003d pushad 0x0000003e mov ax, 2FBBh 0x00000042 pushfd 0x00000043 jmp 00007F9C80FB5670h 0x00000048 or si, CC08h 0x0000004d jmp 00007F9C80FB566Bh 0x00000052 popfd 0x00000053 popad 0x00000054 nop 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a popad 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0519 second address: 50F051D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F051D second address: 50F0523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0523 second address: 50F0529 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0529 second address: 50F052D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F052D second address: 50F053E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov edx, ecx 0x0000000e push esi 0x0000000f pop edi 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F053E second address: 50F05A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, EDh 0x00000005 mov ecx, 27A572F3h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e pushad 0x0000000f call 00007F9C80FB5674h 0x00000014 pushfd 0x00000015 jmp 00007F9C80FB5672h 0x0000001a add ecx, 53D74328h 0x00000020 jmp 00007F9C80FB566Bh 0x00000025 popfd 0x00000026 pop esi 0x00000027 popad 0x00000028 xchg eax, ebx 0x00000029 jmp 00007F9C80FB5672h 0x0000002e push eax 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 mov dx, A5D2h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F05A3 second address: 50F05AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F05AC second address: 50F05CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 xchg eax, ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F9C80FB5673h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F05CA second address: 50F05CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F05CE second address: 50F05D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0632 second address: 50F0649 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9C81394BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F0649 second address: 50F064D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\tPSrcPbmRe.exe | RDTSC instruction interceptor: First address: 50F064D second address: 50F0653 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |