Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1490892168.0000000000AF9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B02000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/0E1 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/com1 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000B02000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B02000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456329603.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shopU |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000003.1456091842.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000003.1456049863.0000000000B84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: 2ZsJ2iP8Q2.exe, 00000000.00000002.1490977315.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, 2ZsJ2iP8Q2.exe, 00000000.00000002.1491103778.0000000000B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB8850 | 0_2_00FB8850 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FBACF0 | 0_2_00FBACF0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A410C | 0_2_010A410C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104D109 | 0_2_0104D109 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BC115 | 0_2_010BC115 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103612B | 0_2_0103612B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B913C | 0_2_010B913C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01042141 | 0_2_01042141 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01087142 | 0_2_01087142 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105814B | 0_2_0105814B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107A15C | 0_2_0107A15C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D0152 | 0_2_010D0152 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01076165 | 0_2_01076165 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108517C | 0_2_0108517C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01095188 | 0_2_01095188 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B118D | 0_2_010B118D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104F18E | 0_2_0104F18E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109D191 | 0_2_0109D191 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104B19E | 0_2_0104B19E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103C1A2 | 0_2_0103C1A2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108F1A9 | 0_2_0108F1A9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010601A2 | 0_2_010601A2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BD1A1 | 0_2_010BD1A1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107F1AA | 0_2_0107F1AA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C91B9 | 0_2_010C91B9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B01B5 | 0_2_010B01B5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107B1C0 | 0_2_0107B1C0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C41C5 | 0_2_010C41C5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010201DC | 0_2_010201DC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109E1E0 | 0_2_0109E1E0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010371EF | 0_2_010371EF |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010381F4 | 0_2_010381F4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010941FE | 0_2_010941FE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B61F1 | 0_2_010B61F1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01048004 | 0_2_01048004 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108A002 | 0_2_0108A002 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01090002 | 0_2_01090002 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01054009 | 0_2_01054009 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104E018 | 0_2_0104E018 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD91DD | 0_2_00FD91DD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109B02D | 0_2_0109B02D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108C021 | 0_2_0108C021 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FEB1D0 | 0_2_00FEB1D0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106B03E | 0_2_0106B03E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BC032 | 0_2_010BC032 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD41C0 | 0_2_00FD41C0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD31C2 | 0_2_00FD31C2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01025047 | 0_2_01025047 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB91B0 | 0_2_00FB91B0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01068049 | 0_2_01068049 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B3068 | 0_2_010B3068 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C806F | 0_2_010C806F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01037067 | 0_2_01037067 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106E060 | 0_2_0106E060 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD2190 | 0_2_00FD2190 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AB08B | 0_2_010AB08B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101B083 | 0_2_0101B083 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104A086 | 0_2_0104A086 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AA08D | 0_2_010AA08D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109809A | 0_2_0109809A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105B09B | 0_2_0105B09B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102D0A3 | 0_2_0102D0A3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108B0A3 | 0_2_0108B0A3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010620B8 | 0_2_010620B8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010140D0 | 0_2_010140D0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B60E2 | 0_2_010B60E2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CF0E6 | 0_2_010CF0E6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010500F5 | 0_2_010500F5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106C0FF | 0_2_0106C0FF |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107C0FB | 0_2_0107C0FB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106D0F8 | 0_2_0106D0F8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109C30E | 0_2_0109C30E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01015309 | 0_2_01015309 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108F319 | 0_2_0108F319 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AB31F | 0_2_010AB31F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FCB2E0 | 0_2_00FCB2E0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C5310 | 0_2_010C5310 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01046319 | 0_2_01046319 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01165336 | 0_2_01165336 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD52DD | 0_2_00FD52DD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01056326 | 0_2_01056326 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102632A | 0_2_0102632A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107333E | 0_2_0107333E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102C33D | 0_2_0102C33D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108B34B | 0_2_0108B34B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108A342 | 0_2_0108A342 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103B358 | 0_2_0103B358 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102235C | 0_2_0102235C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01083368 | 0_2_01083368 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CA36C | 0_2_010CA36C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FCE290 | 0_2_00FCE290 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A137B | 0_2_010A137B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01012374 | 0_2_01012374 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01023375 | 0_2_01023375 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102137B | 0_2_0102137B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107237E | 0_2_0107237E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB6280 | 0_2_00FB6280 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01020388 | 0_2_01020388 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AA39B | 0_2_010AA39B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A739E | 0_2_010A739E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC6263 | 0_2_00FC6263 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109A3BF | 0_2_0109A3BF |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010623BE | 0_2_010623BE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0100A3B9 | 0_2_0100A3B9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A43CC | 0_2_010A43CC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010653D6 | 0_2_010653D6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101E3D3 | 0_2_0101E3D3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010843DB | 0_2_010843DB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010703DE | 0_2_010703DE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC5220 | 0_2_00FC5220 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010253EC | 0_2_010253EC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010903E6 | 0_2_010903E6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDC3FC | 0_2_00FDC3FC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01088239 | 0_2_01088239 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105C236 | 0_2_0105C236 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01069231 | 0_2_01069231 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BB231 | 0_2_010BB231 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01045246 | 0_2_01045246 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C824A | 0_2_010C824A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105725D | 0_2_0105725D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01064258 | 0_2_01064258 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B726A | 0_2_010B726A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107D262 | 0_2_0107D262 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD4380 | 0_2_00FD4380 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105F28A | 0_2_0105F28A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105A292 | 0_2_0105A292 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AD297 | 0_2_010AD297 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D1290 | 0_2_010D1290 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104429B | 0_2_0104429B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D22A3 | 0_2_010D22A3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FED34D | 0_2_00FED34D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104D2B1 | 0_2_0104D2B1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A82B4 | 0_2_010A82B4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDA33F | 0_2_00FDA33F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101C2C3 | 0_2_0101C2C3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010392C6 | 0_2_010392C6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB8330 | 0_2_00FB8330 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FEF330 | 0_2_00FEF330 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D32C3 | 0_2_010D32C3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CD2DF | 0_2_010CD2DF |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AE2D3 | 0_2_010AE2D3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD5327 | 0_2_00FD5327 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB4320 | 0_2_00FB4320 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD830D | 0_2_00FD830D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103E2F0 | 0_2_0103E2F0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102E2F4 | 0_2_0102E2F4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010272F5 | 0_2_010272F5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB74F0 | 0_2_00FB74F0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD91DD | 0_2_00FD91DD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01096524 | 0_2_01096524 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107A537 | 0_2_0107A537 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104A535 | 0_2_0104A535 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107D53E | 0_2_0107D53E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106854F | 0_2_0106854F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104C54F | 0_2_0104C54F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C7559 | 0_2_010C7559 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101C55A | 0_2_0101C55A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107155A | 0_2_0107155A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109E556 | 0_2_0109E556 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B156A | 0_2_010B156A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102A568 | 0_2_0102A568 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104B569 | 0_2_0104B569 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01034572 | 0_2_01034572 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BD57A | 0_2_010BD57A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC148F | 0_2_00FC148F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01082588 | 0_2_01082588 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107B585 | 0_2_0107B585 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01035585 | 0_2_01035585 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107058B | 0_2_0107058B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D1582 | 0_2_010D1582 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103759F | 0_2_0103759F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AB594 | 0_2_010AB594 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103C5AB | 0_2_0103C5AB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105A5AE | 0_2_0105A5AE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010405A8 | 0_2_010405A8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010435AA | 0_2_010435AA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010785C7 | 0_2_010785C7 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010945C8 | 0_2_010945C8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A65D0 | 0_2_010A65D0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0116E5C8 | 0_2_0116E5C8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010515DA | 0_2_010515DA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010155E0 | 0_2_010155E0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C15E7 | 0_2_010C15E7 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0100F5ED | 0_2_0100F5ED |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C95FD | 0_2_010C95FD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010555F6 | 0_2_010555F6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103B5FC | 0_2_0103B5FC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B3403 | 0_2_010B3403 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01036426 | 0_2_01036426 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103D429 | 0_2_0103D429 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CB449 | 0_2_010CB449 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109744F | 0_2_0109744F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A6447 | 0_2_010A6447 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01011455 | 0_2_01011455 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105945B | 0_2_0105945B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC759F | 0_2_00FC759F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104E463 | 0_2_0104E463 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CF462 | 0_2_010CF462 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107B468 | 0_2_0107B468 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109347F | 0_2_0109347F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A347D | 0_2_010A347D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB9580 | 0_2_00FB9580 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BA477 | 0_2_010BA477 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109D48C | 0_2_0109D48C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B4491 | 0_2_010B4491 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102F4A3 | 0_2_0102F4A3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010674A1 | 0_2_010674A1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102B4AE | 0_2_0102B4AE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B94A4 | 0_2_010B94A4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010574B5 | 0_2_010574B5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010484BB | 0_2_010484BB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010504C3 | 0_2_010504C3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106E4DF | 0_2_0106E4DF |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AF4EE | 0_2_010AF4EE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD2510 | 0_2_00FD2510 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010144EC | 0_2_010144EC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109F4FE | 0_2_0109F4FE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FE7500 | 0_2_00FE7500 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010794F8 | 0_2_010794F8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C6703 | 0_2_010C6703 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01076712 | 0_2_01076712 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101371D | 0_2_0101371D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD36E2 | 0_2_00FD36E2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A9715 | 0_2_010A9715 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104D723 | 0_2_0104D723 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD66D0 | 0_2_00FD66D0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01051735 | 0_2_01051735 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CD73D | 0_2_010CD73D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD86C0 | 0_2_00FD86C0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AB749 | 0_2_010AB749 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106F742 | 0_2_0106F742 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01012748 | 0_2_01012748 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105D74F | 0_2_0105D74F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01092746 | 0_2_01092746 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107A75C | 0_2_0107A75C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01061759 | 0_2_01061759 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01090768 | 0_2_01090768 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108B764 | 0_2_0108B764 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AE766 | 0_2_010AE766 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01026771 | 0_2_01026771 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BB770 | 0_2_010BB770 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AA78E | 0_2_010AA78E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01016795 | 0_2_01016795 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106479C | 0_2_0106479C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106979C | 0_2_0106979C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01099793 | 0_2_01099793 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010247AA | 0_2_010247AA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103E7B4 | 0_2_0103E7B4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010187BB | 0_2_010187BB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C27CA | 0_2_010C27CA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010897D1 | 0_2_010897D1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010217DC | 0_2_010217DC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A57E9 | 0_2_010A57E9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CA7EA | 0_2_010CA7EA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010597EC | 0_2_010597EC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD7603 | 0_2_00FD7603 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102C609 | 0_2_0102C609 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CB607 | 0_2_010CB607 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101A60E | 0_2_0101A60E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104E610 | 0_2_0104E610 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D461B | 0_2_010D461B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108062C | 0_2_0108062C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01030632 | 0_2_01030632 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B563E | 0_2_010B563E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104F63D | 0_2_0104F63D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FCE7C0 | 0_2_00FCE7C0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC97C2 | 0_2_00FC97C2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C864B | 0_2_010C864B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0117265E | 0_2_0117265E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106C651 | 0_2_0106C651 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01066662 | 0_2_01066662 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC5799 | 0_2_00FC5799 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC8792 | 0_2_00FC8792 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104666B | 0_2_0104666B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D267F | 0_2_010D267F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01038677 | 0_2_01038677 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0115F66F | 0_2_0115F66F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FBA780 | 0_2_00FBA780 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01169685 | 0_2_01169685 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010916A8 | 0_2_010916A8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D36BD | 0_2_010D36BD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102A6B1 | 0_2_0102A6B1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102E6BB | 0_2_0102E6BB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010866B3 | 0_2_010866B3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101F6BC | 0_2_0101F6BC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106B6C0 | 0_2_0106B6C0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010476CD | 0_2_010476CD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101D6D1 | 0_2_0101D6D1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AD6D7 | 0_2_010AD6D7 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FEF720 | 0_2_00FEF720 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BF6EC | 0_2_010BF6EC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010296E8 | 0_2_010296E8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB6710 | 0_2_00FB6710 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010886E4 | 0_2_010886E4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010736F3 | 0_2_010736F3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102B903 | 0_2_0102B903 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B290C | 0_2_010B290C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0116291F | 0_2_0116291F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C4905 | 0_2_010C4905 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01098918 | 0_2_01098918 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01017914 | 0_2_01017914 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102D917 | 0_2_0102D917 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01035918 | 0_2_01035918 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105692C | 0_2_0105692C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD88CB | 0_2_00FD88CB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01084940 | 0_2_01084940 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A095A | 0_2_010A095A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01015952 | 0_2_01015952 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01099953 | 0_2_01099953 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD18A0 | 0_2_00FD18A0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01022961 | 0_2_01022961 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01026971 | 0_2_01026971 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01043970 | 0_2_01043970 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FED880 | 0_2_00FED880 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BD98D | 0_2_010BD98D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A9982 | 0_2_010A9982 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01066989 | 0_2_01066989 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A699C | 0_2_010A699C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD3860 | 0_2_00FD3860 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0100F9A5 | 0_2_0100F9A5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010689A0 | 0_2_010689A0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102F9A8 | 0_2_0102F9A8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010189AA | 0_2_010189AA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0127699D | 0_2_0127699D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B69B1 | 0_2_010B69B1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105E9C4 | 0_2_0105E9C4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107C9C1 | 0_2_0107C9C1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC682D | 0_2_00FC682D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_011649CC | 0_2_011649CC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A79D0 | 0_2_010A79D0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B49D7 | 0_2_010B49D7 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CB9E7 | 0_2_010CB9E7 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106C9EB | 0_2_0106C9EB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FE8810 | 0_2_00FE8810 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108D9E6 | 0_2_0108D9E6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010419F2 | 0_2_010419F2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B881F | 0_2_010B881F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01048811 | 0_2_01048811 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101981A | 0_2_0101981A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101081E | 0_2_0101081E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108F82D | 0_2_0108F82D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01053828 | 0_2_01053828 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B9826 | 0_2_010B9826 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109A838 | 0_2_0109A838 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01074832 | 0_2_01074832 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BE832 | 0_2_010BE832 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FC79C1 | 0_2_00FC79C1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BB84E | 0_2_010BB84E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105084D | 0_2_0105084D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01091859 | 0_2_01091859 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105C856 | 0_2_0105C856 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103685A | 0_2_0103685A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01081851 | 0_2_01081851 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106D86E | 0_2_0106D86E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB5990 | 0_2_00FB5990 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C3877 | 0_2_010C3877 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FED980 | 0_2_00FED980 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CE889 | 0_2_010CE889 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01060880 | 0_2_01060880 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01023888 | 0_2_01023888 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB3970 | 0_2_00FB3970 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BC897 | 0_2_010BC897 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104C8B2 | 0_2_0104C8B2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103F8BB | 0_2_0103F8BB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FE0940 | 0_2_00FE0940 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD0939 | 0_2_00FD0939 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A18D5 | 0_2_010A18D5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010718EA | 0_2_010718EA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103D8ED | 0_2_0103D8ED |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105F8F4 | 0_2_0105F8F4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107B8FC | 0_2_0107B8FC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107AB0E | 0_2_0107AB0E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010D3B04 | 0_2_010D3B04 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01026B10 | 0_2_01026B10 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01047B13 | 0_2_01047B13 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108BB21 | 0_2_0108BB21 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDCAD0 | 0_2_00FDCAD0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01051B36 | 0_2_01051B36 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104DB31 | 0_2_0104DB31 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01044B33 | 0_2_01044B33 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01099B33 | 0_2_01099B33 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A9B49 | 0_2_010A9B49 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01073B43 | 0_2_01073B43 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01167B53 | 0_2_01167B53 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108EB4E | 0_2_0108EB4E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AAB43 | 0_2_010AAB43 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01090B43 | 0_2_01090B43 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01074B4C | 0_2_01074B4C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01030B59 | 0_2_01030B59 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01033B67 | 0_2_01033B67 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0116BB66 | 0_2_0116BB66 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01058B7D | 0_2_01058B7D |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FEDA80 | 0_2_00FEDA80 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01029B8E | 0_2_01029B8E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105DB88 | 0_2_0105DB88 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B2B9B | 0_2_010B2B9B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01040B95 | 0_2_01040B95 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107FB92 | 0_2_0107FB92 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01045B9C | 0_2_01045B9C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01062BA6 | 0_2_01062BA6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01115BB8 | 0_2_01115BB8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01011BAA | 0_2_01011BAA |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDDA53 | 0_2_00FDDA53 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01096BA6 | 0_2_01096BA6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDCA49 | 0_2_00FDCA49 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010ABBBD | 0_2_010ABBBD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103ABBB | 0_2_0103ABBB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010CCBB4 | 0_2_010CCBB4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106FBC4 | 0_2_0106FBC4 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01010BCD | 0_2_01010BCD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010ADBD3 | 0_2_010ADBD3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01054BE0 | 0_2_01054BE0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FBEA10 | 0_2_00FBEA10 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01028BE9 | 0_2_01028BE9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01089BE3 | 0_2_01089BE3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0104BBE8 | 0_2_0104BBE8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105AA0C | 0_2_0105AA0C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01032A08 | 0_2_01032A08 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01050A09 | 0_2_01050A09 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01010A14 | 0_2_01010A14 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FBDBD9 | 0_2_00FBDBD9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C0A2E | 0_2_010C0A2E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105BA21 | 0_2_0105BA21 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101AA2F | 0_2_0101AA2F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01085A38 | 0_2_01085A38 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A9A37 | 0_2_010A9A37 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01042A47 | 0_2_01042A47 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BFA59 | 0_2_010BFA59 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C8A50 | 0_2_010C8A50 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01080A62 | 0_2_01080A62 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0106BA77 | 0_2_0106BA77 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01028A70 | 0_2_01028A70 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01048A72 | 0_2_01048A72 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AFA71 | 0_2_010AFA71 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01031A82 | 0_2_01031A82 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01095A8B | 0_2_01095A8B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101FA85 | 0_2_0101FA85 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FEDB60 | 0_2_00FEDB60 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01012AA5 | 0_2_01012AA5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD6B50 | 0_2_00FD6B50 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C9AA2 | 0_2_010C9AA2 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AEAB1 | 0_2_010AEAB1 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FCCB40 | 0_2_00FCCB40 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B9ACE | 0_2_010B9ACE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01067AC0 | 0_2_01067AC0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C5AC0 | 0_2_010C5AC0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107DAC9 | 0_2_0107DAC9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109EADD | 0_2_0109EADD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010C7AD0 | 0_2_010C7AD0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDCB22 | 0_2_00FDCB22 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDCB11 | 0_2_00FDCB11 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101CAEE | 0_2_0101CAEE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01025AF0 | 0_2_01025AF0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01046AF6 | 0_2_01046AF6 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FE6B08 | 0_2_00FE6B08 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01029D0C | 0_2_01029D0C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A4D04 | 0_2_010A4D04 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103ED0C | 0_2_0103ED0C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01035D11 | 0_2_01035D11 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01081D15 | 0_2_01081D15 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01095D2C | 0_2_01095D2C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01054D2C | 0_2_01054D2C |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01046D3E | 0_2_01046D3E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01068D49 | 0_2_01068D49 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102CD50 | 0_2_0102CD50 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0101DD54 | 0_2_0101DD54 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01049D53 | 0_2_01049D53 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01017D59 | 0_2_01017D59 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0108CD50 | 0_2_0108CD50 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FEECA0 | 0_2_00FEECA0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01075D59 | 0_2_01075D59 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0107CD59 | 0_2_0107CD59 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BAD6A | 0_2_010BAD6A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FDAC90 | 0_2_00FDAC90 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B6D7F | 0_2_010B6D7F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0103FD7F | 0_2_0103FD7F |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FCFC75 | 0_2_00FCFC75 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010ACD87 | 0_2_010ACD87 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01093D86 | 0_2_01093D86 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105CD95 | 0_2_0105CD95 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010A2D9A | 0_2_010A2D9A |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01041D9E | 0_2_01041D9E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FB4C60 | 0_2_00FB4C60 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0105FD9E | 0_2_0105FD9E |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102DDA3 | 0_2_0102DDA3 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01059DB5 | 0_2_01059DB5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01037DB0 | 0_2_01037DB0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010B5DBD | 0_2_010B5DBD |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109DDBE | 0_2_0109DDBE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01078DC5 | 0_2_01078DC5 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01015DCC | 0_2_01015DCC |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0109FDD9 | 0_2_0109FDD9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FD9C2B | 0_2_00FD9C2B |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_0102EDDB | 0_2_0102EDDB |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010BCDD0 | 0_2_010BCDD0 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01077DE9 | 0_2_01077DE9 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_010AFDF8 | 0_2_010AFDF8 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01095DFE | 0_2_01095DFE |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_00FCDC00 | 0_2_00FCDC00 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | Code function: 0_2_01088C01 | 0_2_01088C01 |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1007FEC second address: 1007FF6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1007FF6 second address: 10078C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEEFCBE0AD9h 0x00000008 jmp 00007FEEFCBE0AD8h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 nop 0x00000011 stc 0x00000012 push dword ptr [ebp+122D0ED9h] 0x00000018 jmp 00007FEEFCBE0AD5h 0x0000001d call dword ptr [ebp+122D1F77h] 0x00000023 pushad 0x00000024 sub dword ptr [ebp+122D1A9Dh], eax 0x0000002a pushad 0x0000002b add ax, 06E0h 0x00000030 sub edx, dword ptr [ebp+122D27D6h] 0x00000036 popad 0x00000037 xor eax, eax 0x00000039 add dword ptr [ebp+122D1A9Dh], ecx 0x0000003f mov dword ptr [ebp+122D2FC0h], eax 0x00000045 mov edx, dword ptr [esp+28h] 0x00000049 xor dword ptr [ebp+122D1A9Dh], eax 0x0000004f mov dword ptr [ebp+122D29DAh], eax 0x00000055 cld 0x00000056 mov esi, 0000003Ch 0x0000005b pushad 0x0000005c mov edi, dword ptr [ebp+122D27B6h] 0x00000062 adc di, 4445h 0x00000067 popad 0x00000068 add esi, dword ptr [esp+24h] 0x0000006c jng 00007FEEFCBE0AC7h 0x00000072 cmc 0x00000073 lodsw 0x00000075 mov dword ptr [ebp+122D1BE2h], esi 0x0000007b mov dword ptr [ebp+122D2D54h], esi 0x00000081 add eax, dword ptr [esp+24h] 0x00000085 jnc 00007FEEFCBE0AD7h 0x0000008b mov ebx, dword ptr [esp+24h] 0x0000008f xor dword ptr [ebp+122D1A9Dh], eax 0x00000095 nop 0x00000096 jl 00007FEEFCBE0ACAh 0x0000009c push eax 0x0000009d push eax 0x0000009e push edx 0x0000009f jp 00007FEEFCBE0ADDh 0x000000a5 jmp 00007FEEFCBE0AD7h 0x000000aa rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117A9DD second address: 117AA05 instructions: 0x00000000 rdtsc 0x00000002 js 00007FEEFCF2A116h 0x00000008 jns 00007FEEFCF2A116h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop esi 0x00000011 push edx 0x00000012 push esi 0x00000013 jmp 00007FEEFCF2A11Fh 0x00000018 pop esi 0x00000019 push edi 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117AC6B second address: 117AC86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FEEFCBE0AD0h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117AC86 second address: 117AC9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCF2A124h 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117B21B second address: 117B238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FEEFCBE0AD0h 0x0000000c jbe 00007FEEFCBE0AC6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E412 second address: 117E417 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E417 second address: 117E421 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FEEFCBE0AC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E421 second address: 117E425 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E4B3 second address: 117E532 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FEEFCBE0AD7h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jp 00007FEEFCBE0ADEh 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 jmp 00007FEEFCBE0AD9h 0x0000001b mov eax, dword ptr [eax] 0x0000001d jmp 00007FEEFCBE0AD6h 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 push ecx 0x00000027 pushad 0x00000028 jnc 00007FEEFCBE0AC6h 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E65C second address: 117E660 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E660 second address: 117E708 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007FEEFCBE0ACCh 0x0000000c popad 0x0000000d mov dword ptr [esp], eax 0x00000010 movzx edx, di 0x00000013 push 00000000h 0x00000015 jnp 00007FEEFCBE0ACDh 0x0000001b jc 00007FEEFCBE0AC7h 0x00000021 cld 0x00000022 push 438CC52Bh 0x00000027 jnp 00007FEEFCBE0ADEh 0x0000002d jnc 00007FEEFCBE0AD8h 0x00000033 xor dword ptr [esp], 438CC5ABh 0x0000003a and cl, FFFFFFACh 0x0000003d push 00000003h 0x0000003f xor edi, 6DCEE3F6h 0x00000045 push 00000000h 0x00000047 mov di, A28Ah 0x0000004b push 00000003h 0x0000004d adc edx, 059A9A24h 0x00000053 push 590A76A9h 0x00000058 jmp 00007FEEFCBE0AD8h 0x0000005d add dword ptr [esp], 66F58957h 0x00000064 mov dl, 67h 0x00000066 lea ebx, dword ptr [ebp+1244A30Ch] 0x0000006c or dword ptr [ebp+122D1BCFh], esi 0x00000072 push eax 0x00000073 push eax 0x00000074 push edx 0x00000075 push ebx 0x00000076 jns 00007FEEFCBE0AC6h 0x0000007c pop ebx 0x0000007d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E708 second address: 117E70E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E70E second address: 117E712 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E7AD second address: 117E7B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E7B3 second address: 117E7B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E7B7 second address: 117E7C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E7C5 second address: 117E7C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E7C9 second address: 117E867 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FEEFCF2A126h 0x0000000f popad 0x00000010 nop 0x00000011 sub dword ptr [ebp+122D192Ah], esi 0x00000017 movzx ecx, cx 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push esi 0x0000001f call 00007FEEFCF2A118h 0x00000024 pop esi 0x00000025 mov dword ptr [esp+04h], esi 0x00000029 add dword ptr [esp+04h], 00000015h 0x00000031 inc esi 0x00000032 push esi 0x00000033 ret 0x00000034 pop esi 0x00000035 ret 0x00000036 pushad 0x00000037 and ebx, dword ptr [ebp+122D2A36h] 0x0000003d push edi 0x0000003e sub ch, FFFFFFABh 0x00000041 pop eax 0x00000042 popad 0x00000043 push 6CA3C2AFh 0x00000048 jc 00007FEEFCF2A124h 0x0000004e xor dword ptr [esp], 6CA3C22Fh 0x00000055 xor dword ptr [ebp+122D1AD0h], edx 0x0000005b push 00000003h 0x0000005d sub dword ptr [ebp+122D1E3Ah], ebx 0x00000063 push 00000000h 0x00000065 mov dx, di 0x00000068 push 00000003h 0x0000006a xor dh, FFFFFF96h 0x0000006d call 00007FEEFCF2A119h 0x00000072 push eax 0x00000073 push edx 0x00000074 push eax 0x00000075 push edx 0x00000076 push ecx 0x00000077 pop ecx 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E867 second address: 117E883 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E883 second address: 117E88D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FEEFCF2A116h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E88D second address: 117E8B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d js 00007FEEFCBE0ACCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E8B4 second address: 117E8E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 js 00007FEEFCF2A122h 0x0000000f jnl 00007FEEFCF2A11Ch 0x00000015 mov eax, dword ptr [eax] 0x00000017 jnp 00007FEEFCF2A11Ah 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 push eax 0x00000025 pop eax 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E8E6 second address: 117E8EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E8EB second address: 117E90E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 stc 0x0000000a lea ebx, dword ptr [ebp+1244A317h] 0x00000010 cld 0x00000011 xchg eax, ebx 0x00000012 pushad 0x00000013 jnl 00007FEEFCF2A11Ch 0x00000019 push eax 0x0000001a push edx 0x0000001b push edx 0x0000001c pop edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 117E90E second address: 117E92E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FEEFCBE0AD6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119E845 second address: 119E873 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FEEFCF2A11Eh 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jne 00007FEEFCF2A128h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119C6BB second address: 119C6C4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119C995 second address: 119C999 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119C999 second address: 119C99F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119C99F second address: 119C9AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push ebx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CAF5 second address: 119CB05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007FEEFCBE0AC6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CB05 second address: 119CB11 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CB11 second address: 119CB17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CB17 second address: 119CB1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CB1B second address: 119CB3C instructions: 0x00000000 rdtsc 0x00000002 ja 00007FEEFCBE0AC6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FEEFCBE0AD5h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CB3C second address: 119CB56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEEFCF2A124h 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CDB5 second address: 119CDBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119CDBB second address: 119CDBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D263 second address: 119D27E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnl 00007FEEFCBE0AC6h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d jmp 00007FEEFCBE0ACBh 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D27E second address: 119D284 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D370 second address: 119D376 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D376 second address: 119D398 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FEEFCF2A116h 0x00000008 jmp 00007FEEFCF2A122h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D398 second address: 119D3BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FEEFCBE0AD8h 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D3BA second address: 119D3C9 instructions: 0x00000000 rdtsc 0x00000002 js 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push edi 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D667 second address: 119D6A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 jmp 00007FEEFCBE0AD6h 0x0000000c jmp 00007FEEFCBE0AD9h 0x00000011 push eax 0x00000012 push edx 0x00000013 jno 00007FEEFCBE0AC6h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D6A7 second address: 119D6AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D80D second address: 119D817 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FEEFCBE0AC6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D817 second address: 119D81D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1193BC3 second address: 1193BC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1193BC9 second address: 1193BE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FEEFCF2A116h 0x0000000a popad 0x0000000b pop esi 0x0000000c jo 00007FEEFCF2A12Ah 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 pop edx 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1193BE3 second address: 1193BE9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D978 second address: 119D97C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119D97C second address: 119D98E instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FEEFCBE0AC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a js 00007FEEFCBE0ADEh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119DF6C second address: 119DF8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jo 00007FEEFCF2A12Bh 0x0000000b jnc 00007FEEFCF2A116h 0x00000011 jmp 00007FEEFCF2A11Fh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119DF8C second address: 119DF98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jc 00007FEEFCBE0AC6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 119DF98 second address: 119DFBD instructions: 0x00000000 rdtsc 0x00000002 je 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FEEFCF2A11Fh 0x00000012 push ecx 0x00000013 jc 00007FEEFCF2A116h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A22BA second address: 11A22C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jng 00007FEEFCBE0AC6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A2902 second address: 11A2906 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A2906 second address: 11A290A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A290A second address: 11A2917 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A2917 second address: 11A291B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A291B second address: 11A2934 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007FEEFCF2A11Ch 0x00000013 jng 00007FEEFCF2A116h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A2934 second address: 11A293A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A293A second address: 11A293E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A11F2 second address: 11A11F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A2A79 second address: 11A2A83 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A2A83 second address: 11A2AB4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEEFCBE0AD1h 0x00000008 jp 00007FEEFCBE0AC6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 pushad 0x00000013 jmp 00007FEEFCBE0ACFh 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A2AB4 second address: 11A2AE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FEEFCF2A116h 0x0000000a popad 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jno 00007FEEFCF2A122h 0x00000016 mov eax, dword ptr [eax] 0x00000018 pushad 0x00000019 jl 00007FEEFCF2A11Ch 0x0000001f jo 00007FEEFCF2A116h 0x00000025 push eax 0x00000026 push edx 0x00000027 push esi 0x00000028 pop esi 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1164051 second address: 1164057 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1164057 second address: 116405D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 116405D second address: 1164069 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1164069 second address: 116406F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11A9D97 second address: 11A9D9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AB6FA second address: 11AB6FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AB6FE second address: 11AB75D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007FEEFCBE0AD5h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jmp 00007FEEFCBE0AD3h 0x00000016 mov eax, dword ptr [eax] 0x00000018 jmp 00007FEEFCBE0AD3h 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FEEFCBE0AD0h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AB75D second address: 11AB763 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AB763 second address: 11AB807 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007FEEFCBE0AC8h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 00000018h 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 mov edi, 55128CD1h 0x00000028 call 00007FEEFCBE0AC9h 0x0000002d jmp 00007FEEFCBE0AD6h 0x00000032 push eax 0x00000033 jc 00007FEEFCBE0AD3h 0x00000039 jmp 00007FEEFCBE0ACDh 0x0000003e mov eax, dword ptr [esp+04h] 0x00000042 pushad 0x00000043 push eax 0x00000044 jmp 00007FEEFCBE0AD0h 0x00000049 pop eax 0x0000004a jmp 00007FEEFCBE0AD4h 0x0000004f popad 0x00000050 mov eax, dword ptr [eax] 0x00000052 push eax 0x00000053 push edx 0x00000054 pushad 0x00000055 jns 00007FEEFCBE0AC6h 0x0000005b jmp 00007FEEFCBE0ACBh 0x00000060 popad 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AB807 second address: 11AB811 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FEEFCF2A116h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AB811 second address: 11AB833 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d jbe 00007FEEFCBE0AC8h 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FEEFCBE0ACBh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11ABF02 second address: 11ABF21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 pushad 0x00000008 push ecx 0x00000009 jmp 00007FEEFCF2A121h 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AC38B second address: 11AC40E instructions: 0x00000000 rdtsc 0x00000002 jg 00007FEEFCBE0AC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b mov dword ptr [esp], ebx 0x0000000e push 00000000h 0x00000010 push ebp 0x00000011 call 00007FEEFCBE0AC8h 0x00000016 pop ebp 0x00000017 mov dword ptr [esp+04h], ebp 0x0000001b add dword ptr [esp+04h], 0000001Bh 0x00000023 inc ebp 0x00000024 push ebp 0x00000025 ret 0x00000026 pop ebp 0x00000027 ret 0x00000028 pushad 0x00000029 or edi, dword ptr [ebp+122D27FAh] 0x0000002f call 00007FEEFCBE0AD3h 0x00000034 mov bx, A50Ah 0x00000038 pop eax 0x00000039 popad 0x0000003a push eax 0x0000003b pushad 0x0000003c jns 00007FEEFCBE0AD5h 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007FEEFCBE0AD9h 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AC91E second address: 11AC924 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AC924 second address: 11AC92C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AC92C second address: 11AC937 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AC937 second address: 11AC940 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11ACE9A second address: 11ACEA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AEAB5 second address: 11AEABB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AE22A second address: 11AE22E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AEABB second address: 11AEABF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AE22E second address: 11AE234 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AEABF second address: 11AEB0E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push edx 0x0000000c jmp 00007FEEFCBE0ACEh 0x00000011 pop edi 0x00000012 and esi, dword ptr [ebp+122D298Eh] 0x00000018 push 00000000h 0x0000001a movsx edi, dx 0x0000001d push 00000000h 0x0000001f push 00000000h 0x00000021 push ebp 0x00000022 call 00007FEEFCBE0AC8h 0x00000027 pop ebp 0x00000028 mov dword ptr [esp+04h], ebp 0x0000002c add dword ptr [esp+04h], 00000019h 0x00000034 inc ebp 0x00000035 push ebp 0x00000036 ret 0x00000037 pop ebp 0x00000038 ret 0x00000039 push eax 0x0000003a push esi 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AF506 second address: 11AF50C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AF242 second address: 11AF25A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEEFCBE0AD4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AF50C second address: 11AF534 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FEEFCF2A129h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AFF16 second address: 11AFF34 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FEEFCBE0AD3h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AFC7F second address: 11AFC85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AFF34 second address: 11AFFC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FEEFCBE0AD4h 0x0000000e popad 0x0000000f nop 0x00000010 push ebx 0x00000011 sub dword ptr [ebp+122D2FCEh], edx 0x00000017 pop edi 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push edx 0x0000001d call 00007FEEFCBE0AC8h 0x00000022 pop edx 0x00000023 mov dword ptr [esp+04h], edx 0x00000027 add dword ptr [esp+04h], 0000001Dh 0x0000002f inc edx 0x00000030 push edx 0x00000031 ret 0x00000032 pop edx 0x00000033 ret 0x00000034 push eax 0x00000035 pop esi 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push esi 0x0000003b call 00007FEEFCBE0AC8h 0x00000040 pop esi 0x00000041 mov dword ptr [esp+04h], esi 0x00000045 add dword ptr [esp+04h], 00000019h 0x0000004d inc esi 0x0000004e push esi 0x0000004f ret 0x00000050 pop esi 0x00000051 ret 0x00000052 mov edi, 7BB73792h 0x00000057 push eax 0x00000058 pushad 0x00000059 push edx 0x0000005a jp 00007FEEFCBE0AC6h 0x00000060 pop edx 0x00000061 push eax 0x00000062 push edx 0x00000063 pushad 0x00000064 popad 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AFFC5 second address: 11AFFC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11AFC85 second address: 11AFC8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B1597 second address: 11B1620 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A11Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c jnp 00007FEEFCF2A116h 0x00000012 pop eax 0x00000013 jnc 00007FEEFCF2A118h 0x00000019 popad 0x0000001a nop 0x0000001b push 00000000h 0x0000001d push ebp 0x0000001e call 00007FEEFCF2A118h 0x00000023 pop ebp 0x00000024 mov dword ptr [esp+04h], ebp 0x00000028 add dword ptr [esp+04h], 00000014h 0x00000030 inc ebp 0x00000031 push ebp 0x00000032 ret 0x00000033 pop ebp 0x00000034 ret 0x00000035 pushad 0x00000036 mov edi, dword ptr [ebp+122D2A6Eh] 0x0000003c mov dword ptr [ebp+122D2104h], edi 0x00000042 popad 0x00000043 mov dword ptr [ebp+122D308Fh], edi 0x00000049 push 00000000h 0x0000004b mov edi, dword ptr [ebp+122D29BEh] 0x00000051 push 00000000h 0x00000053 push 00000000h 0x00000055 push ebx 0x00000056 call 00007FEEFCF2A118h 0x0000005b pop ebx 0x0000005c mov dword ptr [esp+04h], ebx 0x00000060 add dword ptr [esp+04h], 00000016h 0x00000068 inc ebx 0x00000069 push ebx 0x0000006a ret 0x0000006b pop ebx 0x0000006c ret 0x0000006d cmc 0x0000006e push eax 0x0000006f pushad 0x00000070 push eax 0x00000071 push edx 0x00000072 jnl 00007FEEFCF2A116h 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B21BA second address: 11B21BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B29B6 second address: 11B29BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B29BC second address: 11B29C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B29C0 second address: 11B29E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FEEFCF2A121h 0x00000011 push edi 0x00000012 pop edi 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B5E02 second address: 11B5E06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B6316 second address: 11B631A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B631A second address: 11B631E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B631E second address: 11B639F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FEEFCF2A126h 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e popad 0x0000000f popad 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007FEEFCF2A118h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 0000001Ch 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b mov dword ptr [ebp+122D1A87h], edx 0x00000031 push 00000000h 0x00000033 mov edi, dword ptr [ebp+122D2748h] 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push esi 0x0000003e call 00007FEEFCF2A118h 0x00000043 pop esi 0x00000044 mov dword ptr [esp+04h], esi 0x00000048 add dword ptr [esp+04h], 00000018h 0x00000050 inc esi 0x00000051 push esi 0x00000052 ret 0x00000053 pop esi 0x00000054 ret 0x00000055 xchg eax, esi 0x00000056 push eax 0x00000057 push edx 0x00000058 push eax 0x00000059 push edx 0x0000005a jp 00007FEEFCF2A116h 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B639F second address: 11B63B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B959A second address: 11B9611 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A125h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop esi 0x0000000d popad 0x0000000e push eax 0x0000000f pushad 0x00000010 jmp 00007FEEFCF2A11Eh 0x00000015 jns 00007FEEFCF2A12Fh 0x0000001b popad 0x0000001c nop 0x0000001d xor edi, 2D5AA70Ah 0x00000023 push 00000000h 0x00000025 mov dword ptr [ebp+122D1ABAh], edi 0x0000002b push 00000000h 0x0000002d stc 0x0000002e xchg eax, esi 0x0000002f push eax 0x00000030 push edx 0x00000031 jbe 00007FEEFCF2A124h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BB450 second address: 11BB456 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BB456 second address: 11BB45B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BB45B second address: 11BB4B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007FEEFCBE0AC8h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 00000015h 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 mov edi, dword ptr [ebp+122D28A6h] 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push edx 0x00000031 call 00007FEEFCBE0AC8h 0x00000036 pop edx 0x00000037 mov dword ptr [esp+04h], edx 0x0000003b add dword ptr [esp+04h], 00000017h 0x00000043 inc edx 0x00000044 push edx 0x00000045 ret 0x00000046 pop edx 0x00000047 ret 0x00000048 push 00000000h 0x0000004a xchg eax, esi 0x0000004b push ecx 0x0000004c pushad 0x0000004d pushad 0x0000004e popad 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B658F second address: 11B6595 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BE75E second address: 11BE7AB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007FEEFCBE0ACFh 0x0000000e ja 00007FEEFCBE0ADFh 0x00000014 jmp 00007FEEFCBE0AD9h 0x00000019 popad 0x0000001a nop 0x0000001b mov edi, eax 0x0000001d push 00000000h 0x0000001f mov di, dx 0x00000022 push 00000000h 0x00000024 mov bx, ABBEh 0x00000028 push eax 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BE7AB second address: 11BE7B5 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BE7B5 second address: 11BE7BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BE7BB second address: 11BE7BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BA538 second address: 11BA53C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BA53C second address: 11BA542 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BB64A second address: 11BB655 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FEEFCBE0AC6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BB655 second address: 11BB65B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BB65B second address: 11BB65F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11BB718 second address: 11BB71C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C0608 second address: 11C0660 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jg 00007FEEFCBE0ACCh 0x0000000f popad 0x00000010 nop 0x00000011 or dword ptr [ebp+122D1B08h], edi 0x00000017 xor dword ptr [ebp+122D2D82h], edi 0x0000001d push 00000000h 0x0000001f mov edi, dword ptr [ebp+12471DC6h] 0x00000025 push 00000000h 0x00000027 mov bh, dh 0x00000029 xchg eax, esi 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d jmp 00007FEEFCBE0AD2h 0x00000032 push edx 0x00000033 pop edx 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C0660 second address: 11C067A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A11Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C067A second address: 11C0680 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C0680 second address: 11C0684 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C15C7 second address: 11C15CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C15CB second address: 11C15D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C15D8 second address: 11C15DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C15DE second address: 11C15E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C15E3 second address: 11C15EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C25EB second address: 11C25F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C451C second address: 11C452C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FEEFCBE0AC6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C555B second address: 11C555F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C07C6 second address: 11C07CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C1827 second address: 11C1834 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007FEEFCF2A116h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C07CA second address: 11C07D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FEEFCBE0ACCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C388A second address: 11C388E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C5732 second address: 11C57E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 nop 0x00000005 sub edi, 21B6C756h 0x0000000b push dword ptr fs:[00000000h] 0x00000012 jmp 00007FEEFCBE0AD9h 0x00000017 mov dword ptr fs:[00000000h], esp 0x0000001e add edi, dword ptr [ebp+122D2A12h] 0x00000024 movsx ebx, cx 0x00000027 mov eax, dword ptr [ebp+122D0729h] 0x0000002d push 00000000h 0x0000002f push ecx 0x00000030 call 00007FEEFCBE0AC8h 0x00000035 pop ecx 0x00000036 mov dword ptr [esp+04h], ecx 0x0000003a add dword ptr [esp+04h], 00000016h 0x00000042 inc ecx 0x00000043 push ecx 0x00000044 ret 0x00000045 pop ecx 0x00000046 ret 0x00000047 mov ebx, esi 0x00000049 jns 00007FEEFCBE0AD2h 0x0000004f push FFFFFFFFh 0x00000051 push 00000000h 0x00000053 push eax 0x00000054 call 00007FEEFCBE0AC8h 0x00000059 pop eax 0x0000005a mov dword ptr [esp+04h], eax 0x0000005e add dword ptr [esp+04h], 0000001Dh 0x00000066 inc eax 0x00000067 push eax 0x00000068 ret 0x00000069 pop eax 0x0000006a ret 0x0000006b movsx ebx, dx 0x0000006e nop 0x0000006f jmp 00007FEEFCBE0AD0h 0x00000074 push eax 0x00000075 push eax 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 pushad 0x0000007a popad 0x0000007b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11C57E7 second address: 11C57ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11CDA8C second address: 11CDA98 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEEFCBE0ACEh 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11CD1DF second address: 11CD1E9 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FEEFCF2A116h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11CD336 second address: 11CD33A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11CD33A second address: 11CD358 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FEEFCF2A11Fh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4D0D second address: 11D4D11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4D11 second address: 11D4D45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jnc 00007FEEFCF2A116h 0x0000000d pop ebx 0x0000000e popad 0x0000000f push eax 0x00000010 pushad 0x00000011 jmp 00007FEEFCF2A122h 0x00000016 jnp 00007FEEFCF2A118h 0x0000001c popad 0x0000001d mov eax, dword ptr [esp+04h] 0x00000021 pushad 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4D45 second address: 11D4D5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FEEFCBE0ACBh 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4D5D second address: 11D4D68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FEEFCF2A116h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4D68 second address: 11D4D7D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEEFCBE0AD0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4E91 second address: 11D4E9B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4F85 second address: 11D4FA0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0ACCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4FA0 second address: 11D4FA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4FA5 second address: 11D4FAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4FAB second address: 11D4FAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D4FAF second address: 11D4FB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D50AA second address: 11D50B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1172FDB second address: 1172FE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1172FE1 second address: 117300D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FEEFCF2A121h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007FEEFCF2A120h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D974F second address: 11D9766 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007FEEFCBE0AC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jo 00007FEEFCBE0AC6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D9766 second address: 11D977A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FEEFCF2A11Ch 0x0000000e jl 00007FEEFCF2A116h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D977A second address: 11D9782 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11D9F24 second address: 11D9F28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DA09C second address: 11DA0A6 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FEEFCBE0AC6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DA3AA second address: 11DA3B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DA4F7 second address: 11DA506 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DA506 second address: 11DA52B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FEEFCF2A128h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DED9F second address: 11DEDA4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B3381 second address: 1193BC3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b jmp 00007FEEFCF2A11Bh 0x00000010 call dword ptr [ebp+122D24CCh] 0x00000016 push esi 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B3553 second address: 11B357B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jg 00007FEEFCBE0AC6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jl 00007FEEFCBE0AD7h 0x00000014 jmp 00007FEEFCBE0AD1h 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B413A second address: 11B416D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b cld 0x0000000c push 0000001Eh 0x0000000e push 00000000h 0x00000010 push edi 0x00000011 call 00007FEEFCF2A118h 0x00000016 pop edi 0x00000017 mov dword ptr [esp+04h], edi 0x0000001b add dword ptr [esp+04h], 00000018h 0x00000023 inc edi 0x00000024 push edi 0x00000025 ret 0x00000026 pop edi 0x00000027 ret 0x00000028 nop 0x00000029 push edx 0x0000002a pushad 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B42B8 second address: 11B42BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B42BC second address: 11B42C2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B44FA second address: 11B44FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B44FE second address: 11B4530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jg 00007FEEFCF2A116h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 popad 0x00000011 mov dword ptr [esp], eax 0x00000014 mov dx, ax 0x00000017 mov edi, dword ptr [ebp+124729E1h] 0x0000001d lea eax, dword ptr [ebp+1247F0E7h] 0x00000023 mov cx, A15Fh 0x00000027 nop 0x00000028 push eax 0x00000029 push edx 0x0000002a jno 00007FEEFCF2A118h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B4530 second address: 11B4535 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B4535 second address: 11B4547 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b jng 00007FEEFCF2A116h 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B4547 second address: 11B4585 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov dh, 95h 0x0000000c lea eax, dword ptr [ebp+1247F0A3h] 0x00000012 jg 00007FEEFCBE0AD2h 0x00000018 nop 0x00000019 jc 00007FEEFCBE0AD4h 0x0000001f push eax 0x00000020 push edx 0x00000021 push ecx 0x00000022 pop ecx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B4585 second address: 11B45AD instructions: 0x00000000 rdtsc 0x00000002 js 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FEEFCF2A129h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B45AD second address: 11B45B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B45B1 second address: 11B45B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B45B7 second address: 11946C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FEEFCBE0AD1h 0x0000000f call dword ptr [ebp+122D2D6Eh] 0x00000015 pushad 0x00000016 jmp 00007FEEFCBE0AD8h 0x0000001b pushad 0x0000001c push ebx 0x0000001d pop ebx 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FEEFCBE0AD1h 0x00000028 push esi 0x00000029 pop esi 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DDFE0 second address: 11DE000 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007FEEFCF2A11Fh 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop eax 0x0000000f popad 0x00000010 pushad 0x00000011 pushad 0x00000012 push edx 0x00000013 pop edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DE000 second address: 11DE020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCBE0AD7h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B331C second address: 11B3320 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B3320 second address: 11B3381 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0ACEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007FEEFCBE0ACDh 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 jmp 00007FEEFCBE0ACEh 0x00000019 popad 0x0000001a nop 0x0000001b jne 00007FEEFCBE0ADAh 0x00000021 lea eax, dword ptr [ebp+1247F0A3h] 0x00000027 stc 0x00000028 push eax 0x00000029 push eax 0x0000002a push edx 0x0000002b push ebx 0x0000002c jbe 00007FEEFCBE0AC6h 0x00000032 pop ebx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DE6E4 second address: 11DE702 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FEEFCF2A11Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop edi 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DE832 second address: 11DE836 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DE836 second address: 11DE83C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11DE83C second address: 11DE841 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E4D9A second address: 11E4DB9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A121h 0x00000007 jnl 00007FEEFCF2A116h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E4DB9 second address: 11E4DC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FEEFCBE0AC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E4DC3 second address: 11E4DDC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A125h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E4DDC second address: 11E4DFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jno 00007FEEFCBE0ACCh 0x0000000e jmp 00007FEEFCBE0ACBh 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E4DFE second address: 11E4E04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E50BF second address: 11E50D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007FEEFCBE0AD2h 0x0000000b js 00007FEEFCBE0AC6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E50D2 second address: 11E50F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FEEFCF2A128h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E50F3 second address: 11E50F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E54B7 second address: 11E54BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E54BD second address: 11E54C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E561A second address: 11E5624 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E5923 second address: 11E5927 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E5927 second address: 11E594B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pushad 0x00000008 push ebx 0x00000009 jmp 00007FEEFCF2A129h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E594B second address: 11E5965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 jmp 00007FEEFCBE0AD0h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E48D5 second address: 11E48E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jl 00007FEEFCF2A122h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E48E3 second address: 11E48E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E48E9 second address: 11E4909 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007FEEFCF2A121h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E4909 second address: 11E4915 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FEEFCBE0AC6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11E7B90 second address: 11E7BC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A11Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a pushad 0x0000000b jmp 00007FEEFCF2A129h 0x00000010 push eax 0x00000011 push edx 0x00000012 jc 00007FEEFCF2A116h 0x00000018 push esi 0x00000019 pop esi 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 116C678 second address: 116C684 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FEEFCBE0AC6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EBD55 second address: 11EBD5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FEEFCF2A116h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EBF08 second address: 11EBF0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC02E second address: 11EC03F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 js 00007FEEFCF2A116h 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC03F second address: 11EC049 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FEEFCBE0AC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC049 second address: 11EC053 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FEEFCF2A116h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC053 second address: 11EC073 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FEEFCBE0AD6h 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC32E second address: 11EC35E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCF2A11Fh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e jmp 00007FEEFCF2A128h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC35E second address: 11EC377 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD3h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC377 second address: 11EC389 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jg 00007FEEFCF2A116h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC8BB second address: 11EC8C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11EC8C1 second address: 11EC917 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a jmp 00007FEEFCF2A11Ah 0x0000000f jmp 00007FEEFCF2A122h 0x00000014 pushad 0x00000015 popad 0x00000016 jne 00007FEEFCF2A116h 0x0000001c popad 0x0000001d jno 00007FEEFCF2A132h 0x00000023 pushad 0x00000024 pushad 0x00000025 popad 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11ECD25 second address: 11ECD2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F0275 second address: 11F0290 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEEFCF2A125h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F0290 second address: 11F0294 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F0294 second address: 11F029A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 116E12C second address: 116E144 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FEEFCBE0AC8h 0x00000008 jng 00007FEEFCBE0AD2h 0x0000000e jp 00007FEEFCBE0AC6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F2DB2 second address: 11F2DB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F2DB6 second address: 11F2DC7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 js 00007FEEFCBE0AC6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F2DC7 second address: 11F2DD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007FEEFCF2A116h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F2DD6 second address: 11F2E0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD3h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ja 00007FEEFCBE0ADDh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F2E0C second address: 11F2E11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F2E11 second address: 11F2E1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FEEFCBE0AC6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F5EB2 second address: 11F5EB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F57DE second address: 11F57E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F5AA7 second address: 11F5ABD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCF2A120h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F823E second address: 11F8261 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FEEFCBE0AD3h 0x00000008 jp 00007FEEFCBE0AC6h 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F8261 second address: 11F8265 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F8265 second address: 11F8279 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e jg 00007FEEFCBE0AC6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F8279 second address: 11F828C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A11Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F828C second address: 11F8292 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F8292 second address: 11F8297 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F8297 second address: 11F82A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jp 00007FEEFCBE0AC6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F7D86 second address: 11F7D9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCF2A124h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F7D9E second address: 11F7DA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F7DA2 second address: 11F7DC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007FEEFCF2A116h 0x0000000d jo 00007FEEFCF2A116h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 pop eax 0x00000017 pushad 0x00000018 ja 00007FEEFCF2A11Eh 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11F7DC4 second address: 11F7E07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FEEFCBE0ACFh 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FEEFCBE0AD8h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FEEFCBE0AD2h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11FCB39 second address: 11FCB45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jnl 00007FEEFCF2A116h 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11FC1A4 second address: 11FC1D2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FEEFCBE0AD1h 0x00000010 jmp 00007FEEFCBE0AD2h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11FC45C second address: 11FC49C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jng 00007FEEFCF2A116h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FEEFCF2A122h 0x00000012 jng 00007FEEFCF2A135h 0x00000018 jmp 00007FEEFCF2A129h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11FF7F5 second address: 11FF800 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11FF800 second address: 11FF804 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11FF804 second address: 11FF808 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1203F26 second address: 1203F2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1203F2A second address: 1203F6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCBE0ACBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FEEFCBE0AD8h 0x00000013 jmp 00007FEEFCBE0AD0h 0x00000018 jl 00007FEEFCBE0AC6h 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12041F2 second address: 120420E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEEFCF2A126h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120420E second address: 1204212 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1204212 second address: 120424C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCF2A11Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jmp 00007FEEFCF2A11Ah 0x00000013 jnc 00007FEEFCF2A116h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c push eax 0x0000001d push edx 0x0000001e je 00007FEEFCF2A118h 0x00000024 jmp 00007FEEFCF2A11Ah 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12043D9 second address: 12043EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FEEFCBE0AC6h 0x0000000a jc 00007FEEFCBE0AC6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120454B second address: 1204561 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A11Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1204561 second address: 120457D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCBE0AD8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120457D second address: 12045A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A11Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FEEFCF2A126h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12045A6 second address: 12045AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12045AC second address: 12045B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B3FAA second address: 11B3FB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 11B3FB2 second address: 11B3FE3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c mov dword ptr [ebp+122D543Ah], eax 0x00000012 mov ebx, dword ptr [ebp+1247F0E2h] 0x00000018 sub dword ptr [ebp+122D307Ch], eax 0x0000001e add eax, ebx 0x00000020 or di, 3D3Ah 0x00000025 stc 0x00000026 push eax 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a jnc 00007FEEFCF2A116h 0x00000030 pop eax 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120B83B second address: 120B83F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120B83F second address: 120B843 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120B843 second address: 120B849 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120C372 second address: 120C378 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120C9A1 second address: 120C9A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120CC4D second address: 120CC7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A124h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d jmp 00007FEEFCF2A123h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120CF81 second address: 120CF87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 120D23A second address: 120D242 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121290C second address: 1212912 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1212912 second address: 121291C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121291C second address: 1212920 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1212B7F second address: 1212B99 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FEEFCF2A11Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1212E38 second address: 1212E5D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007FEEFCBE0AC6h 0x0000000e jmp 00007FEEFCBE0AD7h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121327A second address: 1213280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1213280 second address: 121328D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007FEEFCBE0ACCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1165B35 second address: 1165B3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121DB5E second address: 121DB62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121DB62 second address: 121DB7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A11Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a js 00007FEEFCF2A116h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121DB7E second address: 121DB9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCBE0AD8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121DB9C second address: 121DBA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121DBA7 second address: 121DBAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121DEBB second address: 121DEBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121E28E second address: 121E2B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD8h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FEEFCBE0ACBh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121E2B5 second address: 121E2BF instructions: 0x00000000 rdtsc 0x00000002 jns 00007FEEFCF2A116h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121E588 second address: 121E592 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FEEFCBE0AC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121E809 second address: 121E834 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jo 00007FEEFCF2A12Ch 0x0000000b push eax 0x0000000c pop eax 0x0000000d jmp 00007FEEFCF2A124h 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 jns 00007FEEFCF2A116h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121F6E2 second address: 121F6EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jnl 00007FEEFCBE0AC6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121F6EF second address: 121F726 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FEEFCF2A11Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007FEEFCF2A124h 0x00000011 jns 00007FEEFCF2A116h 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a jno 00007FEEFCF2A116h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121F726 second address: 121F72A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121F72A second address: 121F73F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A121h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D59C second address: 121D5A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FEEFCBE0AC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D5A6 second address: 121D5AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D5AA second address: 121D5B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D5B0 second address: 121D5BA instructions: 0x00000000 rdtsc 0x00000002 jc 00007FEEFCF2A11Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D5BA second address: 121D5C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D5C3 second address: 121D5E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FEEFCF2A116h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FEEFCF2A121h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D5E3 second address: 121D60D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEEFCBE0AD9h 0x00000008 ja 00007FEEFCBE0AC6h 0x0000000e jbe 00007FEEFCBE0AC6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 121D60D second address: 121D615 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1225D59 second address: 1225D7D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FEEFCBE0AD8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1225D7D second address: 1225D81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 122982E second address: 1229833 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1229981 second address: 12299AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEEFCF2A122h 0x00000009 jmp 00007FEEFCF2A126h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12299AD second address: 12299BE instructions: 0x00000000 rdtsc 0x00000002 jne 00007FEEFCBE0AC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12299BE second address: 12299D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A126h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12299D8 second address: 1229A14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FEEFCBE0AD8h 0x0000000c jmp 00007FEEFCBE0ACCh 0x00000011 jmp 00007FEEFCBE0ACCh 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1229A14 second address: 1229A18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 122D0F0 second address: 122D113 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD9h 0x00000007 jnc 00007FEEFCBE0AC6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 122D113 second address: 122D11E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jns 00007FEEFCF2A116h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 122E80E second address: 122E81D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0ACBh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 122E81D second address: 122E840 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007FEEFCF2A12Dh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 122E840 second address: 122E852 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEEFCBE0ACCh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 122E852 second address: 122E856 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1239DA7 second address: 1239DAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 123D6E5 second address: 123D6FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FEEFCF2A120h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1242B50 second address: 1242B65 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEEFCBE0ACEh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 124A0C6 second address: 124A0D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FEEFCF2A116h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 124A0D2 second address: 124A11B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FEEFCBE0ACAh 0x0000000a popad 0x0000000b pushad 0x0000000c je 00007FEEFCBE0ACEh 0x00000012 jl 00007FEEFCBE0AC6h 0x00000018 pushad 0x00000019 popad 0x0000001a jmp 00007FEEFCBE0ACFh 0x0000001f pushad 0x00000020 jmp 00007FEEFCBE0AD8h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 124A11B second address: 124A121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1256247 second address: 1256265 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FEEFCBE0AD7h 0x00000008 pop ecx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254C10 second address: 1254C3A instructions: 0x00000000 rdtsc 0x00000002 je 00007FEEFCF2A12Dh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jns 00007FEEFCF2A116h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254C3A second address: 1254C3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254C3E second address: 1254C5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FEEFCF2A127h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254C5F second address: 1254C63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254D97 second address: 1254DA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FEEFCF2A118h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254DA5 second address: 1254DBB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0ACEh 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254DBB second address: 1254DBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254DBF second address: 1254DE5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007FEEFCBE0AE6h 0x00000011 pushad 0x00000012 push edx 0x00000013 pop edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254DE5 second address: 1254DFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCF2A11Ah 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254F74 second address: 1254F78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254F78 second address: 1254F86 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254F86 second address: 1254F8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1254F8A second address: 1254FA3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A123h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12550E4 second address: 12550EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12550EA second address: 12550F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12550F0 second address: 12550F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12550F6 second address: 1255104 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007FEEFCF2A116h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 125525B second address: 1255266 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1255266 second address: 125526B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 125526B second address: 1255275 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FEEFCBE0ACEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1258AAA second address: 1258AAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1267407 second address: 1267433 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0ACEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FEEFCBE0AD8h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 116095E second address: 1160966 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1160966 second address: 11609B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCBE0AD8h 0x00000009 js 00007FEEFCBE0AC6h 0x0000000f popad 0x00000010 popad 0x00000011 jng 00007FEEFCBE0AF3h 0x00000017 jns 00007FEEFCBE0ADFh 0x0000001d push esi 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 126215D second address: 1262166 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1262166 second address: 126216C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 127664F second address: 1276653 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1276354 second address: 127639E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD6h 0x00000007 jmp 00007FEEFCBE0AD8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007FEEFCBE0AD8h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128BC15 second address: 128BC1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128B010 second address: 128B016 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128B8D3 second address: 128B8D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128B8D7 second address: 128B908 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCBE0AD2h 0x00000007 jmp 00007FEEFCBE0AD8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128B908 second address: 128B918 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEEFCF2A11Bh 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128B918 second address: 128B93C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEEFCBE0AD9h 0x00000008 jbe 00007FEEFCBE0AC6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128E541 second address: 128E545 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128E610 second address: 128E614 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128E614 second address: 128E61E instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FEEFCF2A116h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128E61E second address: 128E624 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128E7DD second address: 128E801 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEEFCF2A122h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FEEFCF2A11Bh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128EB02 second address: 128EB0F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128EB0F second address: 128EB19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128EB19 second address: 128EB1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128EB1D second address: 128EBA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push edx 0x00000009 and dx, ABB2h 0x0000000e pop edx 0x0000000f push dword ptr [ebp+122D5469h] 0x00000015 xor dword ptr [ebp+1244D3A6h], edx 0x0000001b call 00007FEEFCF2A119h 0x00000020 jbe 00007FEEFCF2A12Eh 0x00000026 jmp 00007FEEFCF2A128h 0x0000002b push eax 0x0000002c jmp 00007FEEFCF2A11Bh 0x00000031 mov eax, dword ptr [esp+04h] 0x00000035 jmp 00007FEEFCF2A125h 0x0000003a mov eax, dword ptr [eax] 0x0000003c jmp 00007FEEFCF2A127h 0x00000041 mov dword ptr [esp+04h], eax 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 push edi 0x0000004a pop edi 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 128EBA7 second address: 128EBAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 12918C2 second address: 12918D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 pushad 0x00000008 jnp 00007FEEFCF2A116h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1293552 second address: 1293558 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2ZsJ2iP8Q2.exe | RDTSC instruction interceptor: First address: 1293558 second address: 129355C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |