Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1372918230.0000000001022000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000002.1384829751.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1372918230.0000000001022000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000002.1384829751.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1372918230.0000000001022000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000002.1384829751.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367058247.0000000000F8C000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367058247.0000000000F8C000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1372918230.0000000001022000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000002.1384829751.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367058247.0000000000F8C000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367058247.0000000000F8C000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367058247.0000000000F8C000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FAA000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367058247.0000000000FA8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/3 |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/: |
Source: pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/C |
Source: pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api4 |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apip |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/c |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000F92000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi; |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000F92000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piBU: |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piK |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://rapeflowwj.lat/api |
Source: pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1372918230.0000000001022000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000002.1384829751.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367058247.0000000000F8C000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1372918230.0000000001022000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000002.1384829751.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: pJRiqnTih0.exe, 00000005.00000002.1384876440.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1367195224.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1381628465.0000000000FC6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/x |
Source: pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1372918230.0000000001022000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000002.1384829751.0000000000F87000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1373035231.0000000000F87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: pJRiqnTih0.exe, 00000005.00000003.1367020560.000000000101A000.00000004.00000020.00020000.00000000.sdmp, pJRiqnTih0.exe, 00000005.00000003.1366975833.0000000001017000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00108850 | 5_2_00108850 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0010ACF0 | 5_2_0010ACF0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D401A | 5_2_001D401A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F6011 | 5_2_001F6011 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BC00F | 5_2_001BC00F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F4002 | 5_2_001F4002 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018E03D | 5_2_0018E03D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025A015 | 5_2_0025A015 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BA02F | 5_2_001BA02F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022001E | 5_2_0022001E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00218064 | 5_2_00218064 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022C06E | 5_2_0022C06E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AA057 | 5_2_001AA057 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017C046 | 5_2_0017C046 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019E04D | 5_2_0019E04D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B204D | 5_2_001B204D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B804C | 5_2_001B804C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A207A | 5_2_001A207A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E407B | 5_2_001E407B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C4070 | 5_2_001C4070 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00180082 | 5_2_00180082 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021E094 | 5_2_0021E094 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016A0D7 | 5_2_0016A0D7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DE0D4 | 5_2_001DE0D4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002100EF | 5_2_002100EF |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002040F4 | 5_2_002040F4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001860FB | 5_2_001860FB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019A0F0 | 5_2_0019A0F0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00196118 | 5_2_00196118 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025612F | 5_2_0025612F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024C116 | 5_2_0024C116 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D8129 | 5_2_001D8129 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019C122 | 5_2_0019C122 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020011B | 5_2_0020011B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021C11E | 5_2_0021C11E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00248161 | 5_2_00248161 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025016D | 5_2_0025016D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EC17E | 5_2_001EC17E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020814F | 5_2_0020814F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00222159 | 5_2_00222159 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E0163 | 5_2_001E0163 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017A196 | 5_2_0017A196 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00122190 | 5_2_00122190 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002C8198 | 5_2_002C8198 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018E1A6 | 5_2_0018E1A6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001241C0 | 5_2_001241C0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FC1CB | 5_2_001FC1CB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001661C2 | 5_2_001661C2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BA1C1 | 5_2_001BA1C1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018421F | 5_2_0018421F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00182208 | 5_2_00182208 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D220F | 5_2_001D220F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B422A | 5_2_001B422A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00254218 | 5_2_00254218 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D027E | 5_2_001D027E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00174279 | 5_2_00174279 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00116263 | 5_2_00116263 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00238257 | 5_2_00238257 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0011E290 | 5_2_0011E290 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EA295 | 5_2_001EA295 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00106280 | 5_2_00106280 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024A2B5 | 5_2_0024A2B5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018A28C | 5_2_0018A28C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022E2BE | 5_2_0022E2BE |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025C285 | 5_2_0025C285 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001762BA | 5_2_001762BA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BC2DA | 5_2_001BC2DA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A02CE | 5_2_001A02CE |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C02EB | 5_2_001C02EB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019E31D | 5_2_0019E31D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00206329 | 5_2_00206329 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00236337 | 5_2_00236337 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012830D | 5_2_0012830D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00108330 | 5_2_00108330 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012A33F | 5_2_0012A33F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023430C | 5_2_0023430C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00104320 | 5_2_00104320 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00208312 | 5_2_00208312 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019232C | 5_2_0019232C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A4322 | 5_2_001A4322 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D6348 | 5_2_001D6348 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016437D | 5_2_0016437D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00212350 | 5_2_00212350 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00170360 | 5_2_00170360 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020C35C | 5_2_0020C35C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FE398 | 5_2_001FE398 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F6395 | 5_2_001F6395 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00124380 | 5_2_00124380 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00160382 | 5_2_00160382 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00190382 | 5_2_00190382 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00194387 | 5_2_00194387 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001663B5 | 5_2_001663B5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020A391 | 5_2_0020A391 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00242393 | 5_2_00242393 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001803D5 | 5_2_001803D5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023A3FD | 5_2_0023A3FD |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002203CB | 5_2_002203CB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012C3FC | 5_2_0012C3FC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F4402 | 5_2_001F4402 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B642C | 5_2_001B642C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F0452 | 5_2_001F0452 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C6479 | 5_2_001C6479 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021E44A | 5_2_0021E44A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022844E | 5_2_0022844E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00226453 | 5_2_00226453 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C0460 | 5_2_001C0460 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025245A | 5_2_0025245A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D8498 | 5_2_001D8498 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002BC4A4 | 5_2_002BC4A4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018E480 | 5_2_0018E480 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002244BF | 5_2_002244BF |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E64B3 | 5_2_001E64B3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00244495 | 5_2_00244495 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001784D5 | 5_2_001784D5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024C4E6 | 5_2_0024C4E6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F24D1 | 5_2_001F24D1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016A4C6 | 5_2_0016A4C6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AE4C6 | 5_2_001AE4C6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E84FA | 5_2_001E84FA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DE4E2 | 5_2_001DE4E2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00122510 | 5_2_00122510 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016250D | 5_2_0016250D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C8507 | 5_2_001C8507 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018A554 | 5_2_0018A554 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00180548 | 5_2_00180548 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FA54A | 5_2_001FA54A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00168576 | 5_2_00168576 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017A566 | 5_2_0017A566 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B056A | 5_2_001B056A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E459D | 5_2_001E459D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00166592 | 5_2_00166592 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001CA594 | 5_2_001CA594 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021E5B4 | 5_2_0021E5B4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B65AC | 5_2_001B65AC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002145E6 | 5_2_002145E6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016C5D9 | 5_2_0016C5D9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019A5CA | 5_2_0019A5CA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002065FC | 5_2_002065FC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C45F9 | 5_2_001C45F9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002105D8 | 5_2_002105D8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B4613 | 5_2_001B4613 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B060E | 5_2_001B060E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00216637 | 5_2_00216637 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021C609 | 5_2_0021C609 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025C66F | 5_2_0025C66F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EC650 | 5_2_001EC650 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023C679 | 5_2_0023C679 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023664F | 5_2_0023664F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BE66F | 5_2_001BE66F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00192681 | 5_2_00192681 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001786B6 | 5_2_001786B6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002C668A | 5_2_002C668A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00246694 | 5_2_00246694 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021869D | 5_2_0021869D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001726D7 | 5_2_001726D7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001266D0 | 5_2_001266D0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001286C0 | 5_2_001286C0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021A6F4 | 5_2_0021A6F4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A86C1 | 5_2_001A86C1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002346C1 | 5_2_002346C1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FC6E2 | 5_2_001FC6E2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00106710 | 5_2_00106710 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D4715 | 5_2_001D4715 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00168719 | 5_2_00168719 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C070F | 5_2_001C070F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C2720 | 5_2_001C2720 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F275E | 5_2_001F275E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00200765 | 5_2_00200765 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B2751 | 5_2_001B2751 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FE748 | 5_2_001FE748 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025877C | 5_2_0025877C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00252778 | 5_2_00252778 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EA77A | 5_2_001EA77A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A6777 | 5_2_001A6777 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00188762 | 5_2_00188762 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00118792 | 5_2_00118792 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0010A780 | 5_2_0010A780 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B47B4 | 5_2_001B47B4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001907A9 | 5_2_001907A9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001CE7A7 | 5_2_001CE7A7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0011E7C0 | 5_2_0011E7C0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022A7C6 | 5_2_0022A7C6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016C7F1 | 5_2_0016C7F1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002287CE | 5_2_002287CE |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002127D7 | 5_2_002127D7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001647E1 | 5_2_001647E1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00138810 | 5_2_00138810 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020A826 | 5_2_0020A826 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DE80D | 5_2_001DE80D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025A803 | 5_2_0025A803 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F882E | 5_2_001F882E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017482D | 5_2_0017482D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0011682D | 5_2_0011682D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E6857 | 5_2_001E6857 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F0847 | 5_2_001F0847 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AE843 | 5_2_001AE843 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024084E | 5_2_0024084E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018C874 | 5_2_0018C874 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00226853 | 5_2_00226853 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001628B5 | 5_2_001628B5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0010C8B6 | 5_2_0010C8B6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001608A6 | 5_2_001608A6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001288CB | 5_2_001288CB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021E8FA | 5_2_0021E8FA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D88C3 | 5_2_001D88C3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A08F9 | 5_2_001A08F9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017C8F0 | 5_2_0017C8F0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001768E7 | 5_2_001768E7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AA8EC | 5_2_001AA8EC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024C8DC | 5_2_0024C8DC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017A911 | 5_2_0017A911 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019A90A | 5_2_0019A90A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001CC908 | 5_2_001CC908 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E4908 | 5_2_001E4908 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00196903 | 5_2_00196903 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00120939 | 5_2_00120939 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019092D | 5_2_0019092D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D095C | 5_2_001D095C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FA959 | 5_2_001FA959 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EE952 | 5_2_001EE952 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023A96C | 5_2_0023A96C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00130940 | 5_2_00130940 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016A977 | 5_2_0016A977 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B097F | 5_2_001B097F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00244941 | 5_2_00244941 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002569A4 | 5_2_002569A4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020099D | 5_2_0020099D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B89DB | 5_2_001B89DB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B69D0 | 5_2_001B69D0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DE9D1 | 5_2_001DE9D1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C09D1 | 5_2_001C09D1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002049F2 | 5_2_002049F2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AE9C9 | 5_2_001AE9C9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001709FB | 5_2_001709FB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002489C9 | 5_2_002489C9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D69F2 | 5_2_001D69F2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018A9E1 | 5_2_0018A9E1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0010EA10 | 5_2_0010EA10 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00250A26 | 5_2_00250A26 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00216A2E | 5_2_00216A2E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C4A01 | 5_2_001C4A01 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A6A3B | 5_2_001A6A3B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BEA3D | 5_2_001BEA3D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002BAA03 | 5_2_002BAA03 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C8A34 | 5_2_001C8A34 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023EA0F | 5_2_0023EA0F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00188A2A | 5_2_00188A2A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F2A2A | 5_2_001F2A2A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B2A59 | 5_2_001B2A59 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EAA5C | 5_2_001EAA5C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A2A5D | 5_2_001A2A5D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024EA70 | 5_2_0024EA70 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012CA49 | 5_2_0012CA49 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00180A43 | 5_2_00180A43 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020EA7B | 5_2_0020EA7B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00246A46 | 5_2_00246A46 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024AA58 | 5_2_0024AA58 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002C4AAE | 5_2_002C4AAE |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00166A9F | 5_2_00166A9F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018EA88 | 5_2_0018EA88 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023CAB3 | 5_2_0023CAB3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00234AB6 | 5_2_00234AB6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F4AB9 | 5_2_001F4AB9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012CAD0 | 5_2_0012CAD0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B4AD9 | 5_2_001B4AD9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00238AFE | 5_2_00238AFE |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020CAC8 | 5_2_0020CAC8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012CB11 | 5_2_0012CB11 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00198B14 | 5_2_00198B14 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F6B06 | 5_2_001F6B06 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00136B08 | 5_2_00136B08 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FEB33 | 5_2_001FEB33 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012CB22 | 5_2_0012CB22 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019CB2D | 5_2_0019CB2D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FCB29 | 5_2_001FCB29 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C2B26 | 5_2_001C2B26 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00126B50 | 5_2_00126B50 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E6B5A | 5_2_001E6B5A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0011CB40 | 5_2_0011CB40 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00178B42 | 5_2_00178B42 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00172B4F | 5_2_00172B4F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001ECB79 | 5_2_001ECB79 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00224B48 | 5_2_00224B48 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00160B67 | 5_2_00160B67 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019AB62 | 5_2_0019AB62 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023EB5C | 5_2_0023EB5C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024CBBD | 5_2_0024CBBD |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E2BB2 | 5_2_001E2BB2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00236B97 | 5_2_00236B97 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E4BA3 | 5_2_001E4BA3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00222BE0 | 5_2_00222BE0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00240BEF | 5_2_00240BEF |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00200BFA | 5_2_00200BFA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017EBCC | 5_2_0017EBCC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00210BC4 | 5_2_00210BC4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00242BC9 | 5_2_00242BC9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023CBD8 | 5_2_0023CBD8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022EC2B | 5_2_0022EC2B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021AC32 | 5_2_0021AC32 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016EC0E | 5_2_0016EC0E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F0C35 | 5_2_001F0C35 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AAC29 | 5_2_001AAC29 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023AC16 | 5_2_0023AC16 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020AC48 | 5_2_0020AC48 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00104C60 | 5_2_00104C60 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012AC90 | 5_2_0012AC90 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00196C8C | 5_2_00196C8C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018CC8E | 5_2_0018CC8E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D8C80 | 5_2_001D8C80 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022AC8B | 5_2_0022AC8B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0013ECA0 | 5_2_0013ECA0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DCCA7 | 5_2_001DCCA7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00238C9D | 5_2_00238C9D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025CCE2 | 5_2_0025CCE2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021CCF0 | 5_2_0021CCF0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017CCC0 | 5_2_0017CCC0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016CCCB | 5_2_0016CCCB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00256CC7 | 5_2_00256CC7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A0CF1 | 5_2_001A0CF1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00214CD1 | 5_2_00214CD1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00184CE5 | 5_2_00184CE5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DAD1C | 5_2_001DAD1C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00206D24 | 5_2_00206D24 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B0D3D | 5_2_001B0D3D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00224D6D | 5_2_00224D6D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0010CD46 | 5_2_0010CD46 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A2D42 | 5_2_001A2D42 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C6D64 | 5_2_001C6D64 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BED9C | 5_2_001BED9C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023AD86 | 5_2_0023AD86 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A4DDA | 5_2_001A4DDA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00180DDB | 5_2_00180DDB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016ADDE | 5_2_0016ADDE |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017ADD8 | 5_2_0017ADD8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00252DF3 | 5_2_00252DF3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D0DC1 | 5_2_001D0DC1 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00168DC8 | 5_2_00168DC8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DEDE4 | 5_2_001DEDE4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AEE18 | 5_2_001AEE18 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025AE2F | 5_2_0025AE2F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018AE32 | 5_2_0018AE32 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00190E20 | 5_2_00190E20 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022CE1B | 5_2_0022CE1B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001ECE21 | 5_2_001ECE21 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020CE67 | 5_2_0020CE67 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002C2E7F | 5_2_002C2E7F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00250E76 | 5_2_00250E76 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00136E74 | 5_2_00136E74 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00236E4E | 5_2_00236E4E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019EE6A | 5_2_0019EE6A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00216E52 | 5_2_00216E52 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B0E8C | 5_2_001B0E8C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FEE86 | 5_2_001FEE86 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00202E82 | 5_2_00202E82 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F4EBC | 5_2_001F4EBC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024EE8C | 5_2_0024EE8C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00204E8E | 5_2_00204E8E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00162EA2 | 5_2_00162EA2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00254E90 | 5_2_00254E90 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00224EE2 | 5_2_00224EE2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00222EE5 | 5_2_00222EE5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0013AEC0 | 5_2_0013AEC0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00188EC3 | 5_2_00188EC3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00198EFE | 5_2_00198EFE |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00166EE4 | 5_2_00166EE4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001CCEEA | 5_2_001CCEEA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001CAF05 | 5_2_001CAF05 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BCF04 | 5_2_001BCF04 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019CF39 | 5_2_0019CF39 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F0F39 | 5_2_001F0F39 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00232F05 | 5_2_00232F05 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00170F21 | 5_2_00170F21 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FCF24 | 5_2_001FCF24 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00102F50 | 5_2_00102F50 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00120F50 | 5_2_00120F50 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DCF54 | 5_2_001DCF54 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00138F59 | 5_2_00138F59 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00194F49 | 5_2_00194F49 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00178F4E | 5_2_00178F4E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0012CF74 | 5_2_0012CF74 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016EF7B | 5_2_0016EF7B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00242F57 | 5_2_00242F57 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024CF57 | 5_2_0024CF57 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E2F9D | 5_2_001E2F9D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F2F96 | 5_2_001F2F96 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025CFAC | 5_2_0025CFAC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00200FB4 | 5_2_00200FB4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EAF85 | 5_2_001EAF85 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0013EFB0 | 5_2_0013EFB0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00168FBB | 5_2_00168FBB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D2FB2 | 5_2_001D2FB2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00258F9D | 5_2_00258F9D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C2FC8 | 5_2_001C2FC8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024903D | 5_2_0024903D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FF005 | 5_2_001FF005 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C103D | 5_2_001C103D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B5038 | 5_2_001B5038 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EB03B | 5_2_001EB03B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024506C | 5_2_0024506C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E907B | 5_2_001E907B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022B057 | 5_2_0022B057 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BB09E | 5_2_001BB09E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023F081 | 5_2_0023F081 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001750AC | 5_2_001750AC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021309A | 5_2_0021309A |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021D09F | 5_2_0021D09F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025B0E7 | 5_2_0025B0E7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D50D9 | 5_2_001D50D9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017D0DB | 5_2_0017D0DB |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002390F8 | 5_2_002390F8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002290C3 | 5_2_002290C3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001850F2 | 5_2_001850F2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022D0C8 | 5_2_0022D0C8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001CF110 | 5_2_001CF110 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00221118 | 5_2_00221118 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016D156 | 5_2_0016D156 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024B171 | 5_2_0024B171 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024717F | 5_2_0024717F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C5141 | 5_2_001C5141 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018D173 | 5_2_0018D173 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016B16C | 5_2_0016B16C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B3199 | 5_2_001B3199 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022F1B8 | 5_2_0022F1B8 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001091B0 | 5_2_001091B0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D11AD | 5_2_001D11AD |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001EF1AC | 5_2_001EF1AC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001DB1AA | 5_2_001DB1AA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001971A0 | 5_2_001971A0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020719C | 5_2_0020719C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0013B1D0 | 5_2_0013B1D0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019B1DA | 5_2_0019B1DA |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002351E6 | 5_2_002351E6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002271E5 | 5_2_002271E5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AD1D6 | 5_2_001AD1D6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001291DD | 5_2_001291DD |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001231C2 | 5_2_001231C2 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002171F5 | 5_2_002171F5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001AF1CF | 5_2_001AF1CF |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A51FF | 5_2_001A51FF |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002531D5 | 5_2_002531D5 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FB1E4 | 5_2_001FB1E4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A3210 | 5_2_001A3210 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C5217 | 5_2_001C5217 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BF23B | 5_2_001BF23B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018B23C | 5_2_0018B23C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00115220 | 5_2_00115220 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F7228 | 5_2_001F7228 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0021B216 | 5_2_0021B216 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00251260 | 5_2_00251260 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00163251 | 5_2_00163251 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B1240 | 5_2_001B1240 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00223254 | 5_2_00223254 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E5264 | 5_2_001E5264 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002412A7 | 5_2_002412A7 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00239280 | 5_2_00239280 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00219284 | 5_2_00219284 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0024D2E6 | 5_2_0024D2E6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002012E3 | 5_2_002012E3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001252DD | 5_2_001252DD |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002452F3 | 5_2_002452F3 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001832C6 | 5_2_001832C6 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D92F9 | 5_2_001D92F9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0017F2FC | 5_2_0017F2FC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023D2CD | 5_2_0023D2CD |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0011B2E0 | 5_2_0011B2E0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001FD2E4 | 5_2_001FD2E4 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001BD31B | 5_2_001BD31B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00205325 | 5_2_00205325 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0016F310 | 5_2_0016F310 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F3314 | 5_2_001F3314 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00169334 | 5_2_00169334 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00173335 | 5_2_00173335 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0013F330 | 5_2_0013F330 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00243302 | 5_2_00243302 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00181334 | 5_2_00181334 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F1330 | 5_2_001F1330 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00125327 | 5_2_00125327 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0013D34D | 5_2_0013D34D |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0025D343 | 5_2_0025D343 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019F36B | 5_2_0019F36B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00171360 | 5_2_00171360 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001CB365 | 5_2_001CB365 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0023335E | 5_2_0023335E |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001A739B | 5_2_001A739B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002173B0 | 5_2_002173B0 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F9389 | 5_2_001F9389 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001D7385 | 5_2_001D7385 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020F38F | 5_2_0020F38F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001873A9 | 5_2_001873A9 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_002C13DF | 5_2_002C13DF |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0022B3DC | 5_2_0022B3DC |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0019D414 | 5_2_0019D414 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E7411 | 5_2_001E7411 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001F343F | 5_2_001F343F |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001E143B | 5_2_001E143B |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001B7436 | 5_2_001B7436 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_00241409 | 5_2_00241409 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0018F436 | 5_2_0018F436 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_0020D46C | 5_2_0020D46C |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | Code function: 5_2_001C1447 | 5_2_001C1447 |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D112D second address: 2D1137 instructions: 0x00000000 rdtsc 0x00000002 js 00007F2890B7CFC6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2B8B1C second address: 2B8B42 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F28915552DAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007F28915552EDh 0x0000000f jmp 00007F28915552DDh 0x00000014 push esi 0x00000015 push edi 0x00000016 pop edi 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D0640 second address: 2D0667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jg 00007F2890B7CFCCh 0x0000000b ja 00007F2890B7CFC6h 0x00000011 pushad 0x00000012 jnc 00007F2890B7CFC6h 0x00000018 jmp 00007F2890B7CFCBh 0x0000001d push edx 0x0000001e pop edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D0667 second address: 2D068F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F28915552E9h 0x0000000a popad 0x0000000b pushad 0x0000000c push ecx 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D068F second address: 2D0695 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D0695 second address: 2D069F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D0831 second address: 2D0835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D38D3 second address: 2D38D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3980 second address: 2D3996 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3996 second address: 2D3A2A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F28915552DCh 0x00000008 jbe 00007F28915552D6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 add dword ptr [esp], 28ED9664h 0x00000017 mov dword ptr [ebp+122D1AF8h], esi 0x0000001d push 00000003h 0x0000001f push 00000000h 0x00000021 push edx 0x00000022 call 00007F28915552D8h 0x00000027 pop edx 0x00000028 mov dword ptr [esp+04h], edx 0x0000002c add dword ptr [esp+04h], 0000001Ah 0x00000034 inc edx 0x00000035 push edx 0x00000036 ret 0x00000037 pop edx 0x00000038 ret 0x00000039 mov ecx, dword ptr [ebp+122D2884h] 0x0000003f push esi 0x00000040 mov dword ptr [ebp+122D27E0h], esi 0x00000046 pop edi 0x00000047 push 00000000h 0x00000049 jmp 00007F28915552E4h 0x0000004e push 00000003h 0x00000050 mov dword ptr [ebp+122D1AC2h], ebx 0x00000056 sbb ecx, 2B1C086Dh 0x0000005c call 00007F28915552D9h 0x00000061 pushad 0x00000062 push eax 0x00000063 jmp 00007F28915552DDh 0x00000068 pop eax 0x00000069 jnp 00007F28915552DCh 0x0000006f push eax 0x00000070 push edx 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3A2A second address: 2D3A3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F2890B7CFCCh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3A3A second address: 2D3A3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3A3E second address: 2D3A66 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F2890B7CFDBh 0x00000008 jmp 00007F2890B7CFD5h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3A66 second address: 2D3A74 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F28915552D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3A74 second address: 2D3AD7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 jmp 00007F2890B7CFD3h 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 jne 00007F2890B7CFE5h 0x00000018 pop eax 0x00000019 or dx, 47B4h 0x0000001e lea ebx, dword ptr [ebp+1244F81Bh] 0x00000024 mov ecx, dword ptr [ebp+122D38C0h] 0x0000002a mov dh, 92h 0x0000002c push eax 0x0000002d je 00007F2890B7CFD0h 0x00000033 pushad 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3B40 second address: 2D3B44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3B44 second address: 2D3B4A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3B4A second address: 2D3C00 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F28915552DCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ecx 0x0000000f call 00007F28915552D8h 0x00000014 pop ecx 0x00000015 mov dword ptr [esp+04h], ecx 0x00000019 add dword ptr [esp+04h], 0000001Dh 0x00000021 inc ecx 0x00000022 push ecx 0x00000023 ret 0x00000024 pop ecx 0x00000025 ret 0x00000026 jmp 00007F28915552E4h 0x0000002b jnp 00007F28915552D8h 0x00000031 mov edx, eax 0x00000033 push 00000000h 0x00000035 call 00007F28915552E7h 0x0000003a jmp 00007F28915552DAh 0x0000003f pop esi 0x00000040 call 00007F28915552D9h 0x00000045 push edx 0x00000046 jmp 00007F28915552E9h 0x0000004b pop edx 0x0000004c push eax 0x0000004d jmp 00007F28915552DCh 0x00000052 mov eax, dword ptr [esp+04h] 0x00000056 push ecx 0x00000057 push eax 0x00000058 push edx 0x00000059 ja 00007F28915552D6h 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3C00 second address: 2D3C15 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jnl 00007F2890B7CFC6h 0x00000012 push esi 0x00000013 pop esi 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3D4B second address: 2D3E05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edi 0x00000006 mov dword ptr [esp], eax 0x00000009 push edx 0x0000000a or dword ptr [ebp+122D24ECh], eax 0x00000010 pop edx 0x00000011 push 00000000h 0x00000013 jmp 00007F28915552E3h 0x00000018 push 4736AA93h 0x0000001d jmp 00007F28915552E9h 0x00000022 xor dword ptr [esp], 4736AA13h 0x00000029 push 00000000h 0x0000002b push ebx 0x0000002c call 00007F28915552D8h 0x00000031 pop ebx 0x00000032 mov dword ptr [esp+04h], ebx 0x00000036 add dword ptr [esp+04h], 00000018h 0x0000003e inc ebx 0x0000003f push ebx 0x00000040 ret 0x00000041 pop ebx 0x00000042 ret 0x00000043 mov dl, BDh 0x00000045 mov edx, dword ptr [ebp+122D38D4h] 0x0000004b mov ecx, dword ptr [ebp+122D3950h] 0x00000051 push 00000003h 0x00000053 push 00000000h 0x00000055 push esi 0x00000056 call 00007F28915552D8h 0x0000005b pop esi 0x0000005c mov dword ptr [esp+04h], esi 0x00000060 add dword ptr [esp+04h], 00000015h 0x00000068 inc esi 0x00000069 push esi 0x0000006a ret 0x0000006b pop esi 0x0000006c ret 0x0000006d push 00000000h 0x0000006f mov dword ptr [ebp+122D341Ah], esi 0x00000075 push 00000003h 0x00000077 or ch, FFFFFFE4h 0x0000007a push 496C8D10h 0x0000007f push esi 0x00000080 push eax 0x00000081 push edx 0x00000082 jmp 00007F28915552DDh 0x00000087 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3E05 second address: 2D3E09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2D3E09 second address: 2D3E30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 add dword ptr [esp], 769372F0h 0x0000000e mov ecx, ebx 0x00000010 lea ebx, dword ptr [ebp+1244F82Fh] 0x00000016 mov edi, dword ptr [ebp+122D37E8h] 0x0000001c xchg eax, ebx 0x0000001d jng 00007F28915552E4h 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F43CF second address: 2F43DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jbe 00007F2890B7CFCEh 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F43DE second address: 2F43E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F43E2 second address: 2F4404 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD6h 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007F2890B7CFC6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F4404 second address: 2F4408 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2C454B second address: 2C4551 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F27CE second address: 2F27D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F2A9A second address: 2F2AA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F31A6 second address: 2F31AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2BBFE6 second address: 2BC030 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD0h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007F2890B7CFC8h 0x00000011 jmp 00007F2890B7CFD7h 0x00000016 popad 0x00000017 js 00007F2890B7CFEBh 0x0000001d push eax 0x0000001e push edx 0x0000001f jp 00007F2890B7CFC6h 0x00000025 jnl 00007F2890B7CFC6h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F3469 second address: 2F347E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F28915552E1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F347E second address: 2F34A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFCAh 0x00000007 jng 00007F2890B7CFC6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pushad 0x00000011 jns 00007F2890B7CFCAh 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F34A2 second address: 2F34AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F3A77 second address: 2F3A80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F7FAB second address: 2F7FB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F7FB0 second address: 2F7FB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F7FB6 second address: 2F7FDA instructions: 0x00000000 rdtsc 0x00000002 jc 00007F28915552D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F28915552E4h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F9080 second address: 2F90B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F2890B7CFD6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F90B0 second address: 2F90D6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F28915552D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F28915552E3h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F90D6 second address: 2F90DC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2F90DC second address: 2F90E1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2FA2BB second address: 2FA2D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD0h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2FA2D5 second address: 2FA2DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F28915552D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2FA2DF second address: 2FA2EB instructions: 0x00000000 rdtsc 0x00000002 ja 00007F2890B7CFC6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2FA2EB second address: 2FA2F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2FEA8C second address: 2FEA92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2FF190 second address: 2FF199 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2FF199 second address: 2FF19D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 301AE4 second address: 301AE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 301AE8 second address: 301B53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov eax, dword ptr [eax] 0x00000009 jmp 00007F2890B7CFD4h 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 jmp 00007F2890B7CFCCh 0x00000017 pop eax 0x00000018 push 00000000h 0x0000001a push edi 0x0000001b call 00007F2890B7CFC8h 0x00000020 pop edi 0x00000021 mov dword ptr [esp+04h], edi 0x00000025 add dword ptr [esp+04h], 0000001Dh 0x0000002d inc edi 0x0000002e push edi 0x0000002f ret 0x00000030 pop edi 0x00000031 ret 0x00000032 clc 0x00000033 call 00007F2890B7CFC9h 0x00000038 push eax 0x00000039 push edx 0x0000003a jg 00007F2890B7CFCCh 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 301B53 second address: 301B7C instructions: 0x00000000 rdtsc 0x00000002 jo 00007F28915552D8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jng 00007F28915552E3h 0x00000013 jmp 00007F28915552DDh 0x00000018 mov eax, dword ptr [esp+04h] 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3022CE second address: 3022D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3022D3 second address: 3022D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3022D9 second address: 3022DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3029A5 second address: 3029A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 302B6B second address: 302B6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 302BDF second address: 302C2D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F28915552DCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007F28915552D8h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 0000001Ch 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 mov dword ptr [ebp+12458990h], edx 0x0000002b jmp 00007F28915552DCh 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 302C2D second address: 302C31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 302C31 second address: 302C37 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30319B second address: 3031D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d jmp 00007F2890B7CFD5h 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3031D2 second address: 30321C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F28915552DCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a stc 0x0000000b push 00000000h 0x0000000d or dword ptr [ebp+12477607h], edx 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007F28915552D8h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 0000001Bh 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f clc 0x00000030 xchg eax, ebx 0x00000031 pushad 0x00000032 push eax 0x00000033 push edx 0x00000034 jo 00007F28915552D6h 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30321C second address: 303225 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 303225 second address: 303238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c jg 00007F28915552D6h 0x00000012 pop eax 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 303BB3 second address: 303BBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3039D4 second address: 3039D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3039D8 second address: 3039DE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3039DE second address: 3039EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F28915552DCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 304A3C second address: 304A46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F2890B7CFC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30B0ED second address: 30B0F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30B0F3 second address: 30B0F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30C0D6 second address: 30C119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov dword ptr [ebp+12449B01h], edi 0x0000000f push 00000000h 0x00000011 call 00007F28915552E5h 0x00000016 mov ebx, dword ptr [ebp+122D27D9h] 0x0000001c pop edi 0x0000001d push 00000000h 0x0000001f jmp 00007F28915552DFh 0x00000024 push eax 0x00000025 pushad 0x00000026 push ebx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30D06B second address: 30D06F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30DFC1 second address: 30E00F instructions: 0x00000000 rdtsc 0x00000002 jns 00007F28915552D8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov dword ptr [ebp+122D1C0Ah], esi 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007F28915552D8h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 00000018h 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d push 00000000h 0x0000002f add edi, dword ptr [ebp+122D38F0h] 0x00000035 or dword ptr [ebp+12448E3Dh], ecx 0x0000003b push eax 0x0000003c jns 00007F28915552FBh 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30E00F second address: 30E013 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 305E7F second address: 305E89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F28915552D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 305E89 second address: 305E9B instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2890B7CFC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30FF35 second address: 30FF39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 305E9B second address: 305EA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 305EA0 second address: 305EA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30B305 second address: 30B30F instructions: 0x00000000 rdtsc 0x00000002 je 00007F2890B7CFCCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 311F89 second address: 311F8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 311F8D second address: 311F93 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 311F93 second address: 311F99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 311F99 second address: 311F9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 312FD8 second address: 312FDD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 312FDD second address: 312FFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2890B7CFD1h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3121CF second address: 3121D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 312FFA second address: 313082 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007F2890B7CFC8h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 0000001Bh 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 add bx, 7C97h 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push esi 0x0000002e call 00007F2890B7CFC8h 0x00000033 pop esi 0x00000034 mov dword ptr [esp+04h], esi 0x00000038 add dword ptr [esp+04h], 00000019h 0x00000040 inc esi 0x00000041 push esi 0x00000042 ret 0x00000043 pop esi 0x00000044 ret 0x00000045 sbb bx, 749Fh 0x0000004a pushad 0x0000004b mov edx, dword ptr [ebp+122D19E0h] 0x00000051 mov dword ptr [ebp+1246ADA1h], edx 0x00000057 popad 0x00000058 push 00000000h 0x0000005a push eax 0x0000005b push eax 0x0000005c push edx 0x0000005d jnc 00007F2890B7CFC8h 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3121D4 second address: 3121FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F28915552E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007F28915552D6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 313082 second address: 313088 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 313088 second address: 31308C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 315059 second address: 31505D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 31505D second address: 31506B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007F28915552D6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3131EE second address: 3131F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3142B5 second address: 3142BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 316104 second address: 31617F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov bh, 36h 0x0000000d mov ebx, dword ptr [ebp+122D36CCh] 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007F2890B7CFC8h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 00000014h 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f pushad 0x00000030 mov eax, 3C6AB911h 0x00000035 xor edx, dword ptr [ebp+122D1821h] 0x0000003b popad 0x0000003c push 00000000h 0x0000003e jng 00007F2890B7CFDDh 0x00000044 call 00007F2890B7CFD0h 0x00000049 add ebx, dword ptr [ebp+122D3780h] 0x0000004f pop edi 0x00000050 xchg eax, esi 0x00000051 jmp 00007F2890B7CFD7h 0x00000056 push eax 0x00000057 pushad 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b popad 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3132A4 second address: 3132A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3142BA second address: 314350 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2890B7CFC8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007F2890B7CFC8h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 00000014h 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 or ebx, dword ptr [ebp+122D26FDh] 0x0000002b push dword ptr fs:[00000000h] 0x00000032 mov dword ptr [ebp+122D1AF8h], eax 0x00000038 mov dword ptr fs:[00000000h], esp 0x0000003f push 00000000h 0x00000041 push eax 0x00000042 call 00007F2890B7CFC8h 0x00000047 pop eax 0x00000048 mov dword ptr [esp+04h], eax 0x0000004c add dword ptr [esp+04h], 0000001Ah 0x00000054 inc eax 0x00000055 push eax 0x00000056 ret 0x00000057 pop eax 0x00000058 ret 0x00000059 or edi, 6FE0338Fh 0x0000005f cld 0x00000060 jg 00007F2890B7CFCCh 0x00000066 mov eax, dword ptr [ebp+122D040Dh] 0x0000006c pushad 0x0000006d mov al, D0h 0x0000006f mov dword ptr [ebp+124606ABh], edi 0x00000075 popad 0x00000076 push FFFFFFFFh 0x00000078 add dword ptr [ebp+122D29ECh], edi 0x0000007e nop 0x0000007f push edi 0x00000080 push eax 0x00000081 push edx 0x00000082 push eax 0x00000083 push edx 0x00000084 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 31617F second address: 316183 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 314350 second address: 314354 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3132A8 second address: 3132AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3132AC second address: 3132B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 31633D second address: 316343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 31831E second address: 318335 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFCDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 318335 second address: 318339 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3173EB second address: 3173EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3174D4 second address: 3174DA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3174DA second address: 3174E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3174E0 second address: 3174E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 31BA64 second address: 31BA68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 31FECF second address: 31FED4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 31FED4 second address: 31FEDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2C2945 second address: 2C294B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2C294B second address: 2C2952 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2C2952 second address: 2C2971 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F28915552DEh 0x00000009 jg 00007F28915552D6h 0x0000000f popad 0x00000010 pop ebx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2C2971 second address: 2C297B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F2890B7CFC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2C297B second address: 2C298A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jno 00007F28915552D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3307FF second address: 330806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 330806 second address: 33082C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F28915552E2h 0x00000008 pushad 0x00000009 popad 0x0000000a jnl 00007F28915552D6h 0x00000010 popad 0x00000011 jng 00007F28915552DEh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FAC7 second address: 32FACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FACB second address: 32FACF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FACF second address: 32FAD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FAD5 second address: 32FAF2 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F28915552D8h 0x00000008 ja 00007F28915552D8h 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jne 00007F28915552D6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FC62 second address: 32FC96 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2890B7CFCBh 0x00000008 jmp 00007F2890B7CFCBh 0x0000000d jp 00007F2890B7CFC6h 0x00000013 jmp 00007F2890B7CFD0h 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FC96 second address: 32FC9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FDDA second address: 32FDDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FDDE second address: 32FDEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F28915552D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FDEF second address: 32FDF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FF2C second address: 32FF41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F28915552E1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FF41 second address: 32FF45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FF45 second address: 32FF53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FF53 second address: 32FF57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FF57 second address: 32FF7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F28915552E8h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FF7C second address: 32FF86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F2890B7CFC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 32FF86 second address: 32FF90 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F28915552D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33023C second address: 330243 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3304EB second address: 3304F1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3304F1 second address: 330519 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F2890B7CFDEh 0x00000008 jmp 00007F2890B7CFCCh 0x0000000d jmp 00007F2890B7CFCCh 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push edi 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 330694 second address: 330699 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3333DE second address: 3333E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3333E2 second address: 3333EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33AC1A second address: 33AC1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33AC1E second address: 33AC2E instructions: 0x00000000 rdtsc 0x00000002 jc 00007F28915552D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33AC2E second address: 33AC32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33AC32 second address: 33AC6B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007F28915552E6h 0x0000000c ja 00007F28915552D6h 0x00000012 pop esi 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 jp 00007F28915552E2h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33AC6B second address: 33AC71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 339AC5 second address: 339ACF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F28915552D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300389 second address: 30038D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30038D second address: 30039A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30039A second address: 300422 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F2890B7CFCCh 0x0000000c popad 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007F2890B7CFC8h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 jmp 00007F2890B7CFD1h 0x0000002d lea eax, dword ptr [ebp+1247C073h] 0x00000033 push 00000000h 0x00000035 push esi 0x00000036 call 00007F2890B7CFC8h 0x0000003b pop esi 0x0000003c mov dword ptr [esp+04h], esi 0x00000040 add dword ptr [esp+04h], 00000019h 0x00000048 inc esi 0x00000049 push esi 0x0000004a ret 0x0000004b pop esi 0x0000004c ret 0x0000004d call 00007F2890B7CFCCh 0x00000052 cmc 0x00000053 pop edi 0x00000054 push eax 0x00000055 js 00007F2890B7CFCEh 0x0000005b push ebx 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3005B2 second address: 3005B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300A93 second address: 300A98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300A98 second address: 300AC4 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F28915552D8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 72A799E0h 0x00000013 jng 00007F28915552DBh 0x00000019 mov edx, 23C27900h 0x0000001e push CF6E73C6h 0x00000023 pushad 0x00000024 jnc 00007F28915552DCh 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300C1D second address: 300C21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300C21 second address: 300C25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300C25 second address: 300C3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], esi 0x00000009 jnp 00007F2890B7CFC6h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jng 00007F2890B7CFCCh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300C3F second address: 300C43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 300E1F second address: 300E29 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2890B7CFCCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3012E1 second address: 301327 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007F28915552D6h 0x00000009 jmp 00007F28915552E6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov dword ptr [esp], eax 0x00000014 add edx, dword ptr [ebp+122D1877h] 0x0000001a push 0000001Eh 0x0000001c mov cx, si 0x0000001f nop 0x00000020 push eax 0x00000021 push edx 0x00000022 push esi 0x00000023 jmp 00007F28915552E1h 0x00000028 pop esi 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 301327 second address: 301331 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F2890B7CFC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 301331 second address: 301335 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30148D second address: 301493 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 301493 second address: 301498 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 30169E second address: 3016BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2890B7CFD3h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3016BD second address: 3016C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3016C1 second address: 3016C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3016C7 second address: 301747 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F28915552D6h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push ecx 0x00000012 call 00007F28915552D8h 0x00000017 pop ecx 0x00000018 mov dword ptr [esp+04h], ecx 0x0000001c add dword ptr [esp+04h], 00000019h 0x00000024 inc ecx 0x00000025 push ecx 0x00000026 ret 0x00000027 pop ecx 0x00000028 ret 0x00000029 push eax 0x0000002a pushad 0x0000002b jmp 00007F28915552E6h 0x00000030 push ecx 0x00000031 pop edi 0x00000032 popad 0x00000033 pop ecx 0x00000034 lea eax, dword ptr [ebp+1247C0B7h] 0x0000003a push 00000000h 0x0000003c push esi 0x0000003d call 00007F28915552D8h 0x00000042 pop esi 0x00000043 mov dword ptr [esp+04h], esi 0x00000047 add dword ptr [esp+04h], 00000016h 0x0000004f inc esi 0x00000050 push esi 0x00000051 ret 0x00000052 pop esi 0x00000053 ret 0x00000054 push eax 0x00000055 push esi 0x00000056 push eax 0x00000057 push edx 0x00000058 jmp 00007F28915552DCh 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 339DF6 second address: 339E12 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F2890B7CFCCh 0x0000000d jnc 00007F2890B7CFCEh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33A22C second address: 33A230 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33A392 second address: 33A3A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2890B7CFCAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33A3A0 second address: 33A3AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007F28915552D8h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33A3AE second address: 33A3CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F2890B7CFC6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jns 00007F2890B7CFC8h 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33A3CB second address: 33A3CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 341140 second address: 341147 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 341147 second address: 341155 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F28915552D8h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33FE08 second address: 33FE0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 33FF3C second address: 33FF5E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F28915552E2h 0x00000008 jmp 00007F28915552DBh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 340414 second address: 340419 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 340811 second address: 340817 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 340817 second address: 34081B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34081B second address: 34082A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34082A second address: 34082E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34082E second address: 340834 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 340834 second address: 340847 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F2890B7CFCAh 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34098E second address: 3409BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F28915552E3h 0x00000009 jmp 00007F28915552E8h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 346429 second address: 346446 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2890B7CFD3h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3465B8 second address: 3465BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3465BC second address: 3465D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jne 00007F2890B7CFD2h 0x0000000d jo 00007F2890B7CFC6h 0x00000013 jno 00007F2890B7CFC6h 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3465D9 second address: 3465DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 346910 second address: 346914 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 346BF4 second address: 346BF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 346BF8 second address: 346C04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F2890B7CFC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 346D66 second address: 346D72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F28915552D6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 346D72 second address: 346D7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 346D7A second address: 346D86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F28915552D6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 347086 second address: 34708B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3474FC second address: 347504 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34A978 second address: 34A97D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34AACA second address: 34AAD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007F28915552D6h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34AAD9 second address: 34AAE8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 ja 00007F2890B7CFC6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 34CF21 second address: 34CF39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F28915552E4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35235F second address: 35236F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jc 00007F2890B7CFC6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35236F second address: 352373 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35248A second address: 35248E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35248E second address: 3524AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F28915552DEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007F28915552D6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3524AA second address: 3524B8 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2890B7CFC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3524B8 second address: 3524BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35296C second address: 352972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 352972 second address: 352976 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 352976 second address: 35297A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35297A second address: 35298A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push edx 0x00000008 jl 00007F28915552DCh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3003A8 second address: 300422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push edx 0x00000009 call 00007F2890B7CFC8h 0x0000000e pop edx 0x0000000f mov dword ptr [esp+04h], edx 0x00000013 add dword ptr [esp+04h], 0000001Ch 0x0000001b inc edx 0x0000001c push edx 0x0000001d ret 0x0000001e pop edx 0x0000001f ret 0x00000020 jmp 00007F2890B7CFD1h 0x00000025 lea eax, dword ptr [ebp+1247C073h] 0x0000002b push 00000000h 0x0000002d push esi 0x0000002e call 00007F2890B7CFC8h 0x00000033 pop esi 0x00000034 mov dword ptr [esp+04h], esi 0x00000038 add dword ptr [esp+04h], 00000019h 0x00000040 inc esi 0x00000041 push esi 0x00000042 ret 0x00000043 pop esi 0x00000044 ret 0x00000045 call 00007F2890B7CFCCh 0x0000004a cmc 0x0000004b pop edi 0x0000004c push eax 0x0000004d js 00007F2890B7CFCEh 0x00000053 push ebx 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 357578 second address: 35757C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35757C second address: 35758E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F2890B7CFCEh 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35758E second address: 357592 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 357592 second address: 3575C1 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2890B7CFC8h 0x00000008 jmp 00007F2890B7CFCFh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f js 00007F2890B7CFDAh 0x00000015 push eax 0x00000016 push edx 0x00000017 ja 00007F2890B7CFC6h 0x0000001d jl 00007F2890B7CFC6h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356C58 second address: 356C5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356C5C second address: 356C66 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2890B7CFC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356C66 second address: 356C93 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007F28915552D6h 0x00000009 jmp 00007F28915552E9h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356C93 second address: 356C99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356C99 second address: 356CA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356DE9 second address: 356DEF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356DEF second address: 356E39 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F28915552DCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b pushad 0x0000000c jmp 00007F28915552E8h 0x00000011 jmp 00007F28915552E3h 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b js 00007F28915552D6h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356E39 second address: 356E3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 356E3D second address: 356E41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3572A8 second address: 3572AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3572AC second address: 3572CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F28915552E9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35B41D second address: 35B426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35B426 second address: 35B42B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 2CB1EC second address: 2CB226 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 je 00007F2890B7CFC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d jmp 00007F2890B7CFD4h 0x00000012 pop ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F2890B7CFD4h 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35A9B1 second address: 35A9B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35ACA0 second address: 35ACA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35ACA4 second address: 35ACB8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jno 00007F28915552D6h 0x0000000d jp 00007F28915552D6h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35ACB8 second address: 35ACCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2890B7CFD0h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35AE04 second address: 35AE53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F28915552D6h 0x0000000a pop eax 0x0000000b pushad 0x0000000c jnp 00007F28915552D6h 0x00000012 jmp 00007F28915552E9h 0x00000017 jmp 00007F28915552E3h 0x0000001c popad 0x0000001d push edx 0x0000001e jmp 00007F28915552DDh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 35AFD0 second address: 35AFD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 364A23 second address: 364A3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007F28915552E5h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 364A3E second address: 364A42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 362A54 second address: 362A58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 362B97 second address: 362BAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 pop edx 0x0000000a pushad 0x0000000b pushad 0x0000000c push edi 0x0000000d pop edi 0x0000000e pushad 0x0000000f popad 0x00000010 jp 00007F2890B7CFC6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 362BAF second address: 362BC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F28915552E2h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 362D0D second address: 362D21 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F2890B7CFC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F2890B7CFCAh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3631E7 second address: 3631F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F28915552D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3631F1 second address: 3631F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3631F5 second address: 363205 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jns 00007F28915552D6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 363205 second address: 36320F instructions: 0x00000000 rdtsc 0x00000002 jc 00007F2890B7CFC6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 36355E second address: 363564 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 363564 second address: 36356C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 36382A second address: 363837 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnp 00007F28915552D8h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3646BE second address: 3646C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3646C2 second address: 3646DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jl 00007F28915552D6h 0x0000000f jmp 00007F28915552DAh 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 367974 second address: 367998 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 ja 00007F2890B7CFD5h 0x0000000b pushad 0x0000000c push esi 0x0000000d jne 00007F2890B7CFC6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 367998 second address: 3679C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push edx 0x00000006 jmp 00007F28915552E5h 0x0000000b jmp 00007F28915552DAh 0x00000010 pop edx 0x00000011 jo 00007F28915552DCh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 367B45 second address: 367B4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 367B4B second address: 367B4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 367CB7 second address: 367CBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 368326 second address: 36832C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 36832C second address: 368334 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 36E631 second address: 36E64F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F28915552E9h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 36E64F second address: 36E659 instructions: 0x00000000 rdtsc 0x00000002 js 00007F2890B7CFDDh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 375E7F second address: 375E84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 375E84 second address: 375E90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F2890B7CFC6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3762B3 second address: 3762B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3762B7 second address: 3762E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jo 00007F2890B7CFDBh 0x0000000e jmp 00007F2890B7CFD5h 0x00000013 je 00007F2890B7CFC8h 0x00000019 pushad 0x0000001a popad 0x0000001b push edi 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 376708 second address: 37670C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 37670C second address: 376746 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD9h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c jno 00007F2890B7CFC6h 0x00000012 jmp 00007F2890B7CFD3h 0x00000017 pop ebx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 377044 second address: 377057 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F28915552DFh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 377057 second address: 37706D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F2890B7CFCCh 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 37706D second address: 377086 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F28915552DCh 0x00000008 js 00007F28915552D6h 0x0000000e pushad 0x0000000f jne 00007F28915552D6h 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 37779A second address: 37779E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 37779E second address: 3777A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 37D255 second address: 37D26B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 37E913 second address: 37E92A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jne 00007F28915552D6h 0x0000000c popad 0x0000000d jc 00007F28915552DAh 0x00000013 pushad 0x00000014 popad 0x00000015 push edx 0x00000016 pop edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 37E92A second address: 37E930 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38BF2E second address: 38BF4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F28915552E6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38C0B1 second address: 38C0CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop ebx 0x00000008 push ecx 0x00000009 jmp 00007F2890B7CFCAh 0x0000000e pushad 0x0000000f jbe 00007F2890B7CFC6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38C0CD second address: 38C0D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38ED7B second address: 38ED81 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38ED81 second address: 38ED86 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38ED86 second address: 38ED8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38EEE9 second address: 38EEED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38EEED second address: 38EF10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F2890B7CFC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F2890B7CFCFh 0x00000011 push eax 0x00000012 push edx 0x00000013 jl 00007F2890B7CFC6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 38EF10 second address: 38EF16 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 39C962 second address: 39C96C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F2890B7CFC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 39C96C second address: 39C972 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 39C972 second address: 39C97C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 39C97C second address: 39C99B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F28915552E3h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 39E061 second address: 39E069 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A2E77 second address: 3A2E97 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F28915552E8h 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F28915552E0h 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A74BD second address: 3A74C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A74C1 second address: 3A74C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A74C5 second address: 3A74CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7767 second address: 3A7771 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7771 second address: 3A7777 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78C1 second address: 3A78C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78C7 second address: 3A78D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F2890B7CFC6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78D3 second address: 3A78DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78DC second address: 3A78E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F2890B7CFC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78E6 second address: 3A78EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78EA second address: 3A78F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78F0 second address: 3A78F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78F6 second address: 3A78FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A78FA second address: 3A78FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7A57 second address: 3A7A5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7A5D second address: 3A7A62 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7A62 second address: 3A7A73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007F2890B7CFC6h 0x0000000f push esi 0x00000010 pop esi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7A73 second address: 3A7A77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7A77 second address: 3A7A7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7BEC second address: 3A7BF6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F28915552D6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7DB0 second address: 3A7DB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7DB4 second address: 3A7DBE instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F28915552D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7DBE second address: 3A7DD3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F2890B7CFCCh 0x00000008 jng 00007F2890B7CFC6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A7DD3 second address: 3A7DE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007F28915552D6h 0x00000010 push esi 0x00000011 pop esi 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A8937 second address: 3A893B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A893B second address: 3A893F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A893F second address: 3A8945 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3A8945 second address: 3A8963 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F28915552E9h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3AC4C4 second address: 3AC4CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop esi 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3AC0D2 second address: 3AC0D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3AF7EA second address: 3AF7F0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3AF7F0 second address: 3AF7FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3AF7FA second address: 3AF810 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2890B7CFD2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3C992C second address: 3C994A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F28915552E8h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3C994A second address: 3C9959 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007F2890B7CFC6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3CBACC second address: 3CBADC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F28915552DAh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E00DB second address: 3E00DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E00DF second address: 3E00E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E00E5 second address: 3E00EA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E00EA second address: 3E00F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E0551 second address: 3E0562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F2890B7CFC6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push esi 0x00000010 pop esi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E0562 second address: 3E0568 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E092C second address: 3E0931 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E0931 second address: 3E093D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F28915552D6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E4B27 second address: 3E4B2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E5091 second address: 3E5097 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E5097 second address: 3E509B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E64F7 second address: 3E650C instructions: 0x00000000 rdtsc 0x00000002 jng 00007F28915552D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jno 00007F28915552D6h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E650C second address: 3E6511 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E6511 second address: 3E6537 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jl 00007F28915552D6h 0x00000009 pop eax 0x0000000a jo 00007F28915552D8h 0x00000010 push edi 0x00000011 pop edi 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 jmp 00007F28915552DBh 0x0000001c pop esi 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E6537 second address: 3E653F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E653F second address: 3E6544 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E6544 second address: 3E6563 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2890B7CFD9h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E6563 second address: 3E656C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E8416 second address: 3E841A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3E841A second address: 3E8427 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 304499 second address: 3044A3 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2890B7CFC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\pJRiqnTih0.exe | RDTSC instruction interceptor: First address: 3047BB second address: 3047C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |