Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampow |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.1 |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steam |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/I |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2. |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclD |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.000000000157C000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.000000000157C000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.000000000157C000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015F4000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015F4000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbY |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376837194.00000000015F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/button |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.st |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: 35K4Py4lii.exe, 00000000.00000002.1378297153.000000000159A000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376764955.0000000001599000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: 35K4Py4lii.exe, 00000000.00000002.1378240748.0000000001582000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.0000000001582000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/900 |
Source: 35K4Py4lii.exe, 00000000.00000002.1378297153.000000000159A000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376764955.0000000001599000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/d |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/j |
Source: 35K4Py4lii.exe, 00000000.00000002.1378240748.0000000001582000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376602406.0000000001582000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steamp |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.000000000157C000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378140575.0000000001578000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: 35K4Py4lii.exe, 00000000.00000003.1364875747.00000000015F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: 35K4Py4lii.exe, 00000000.00000003.1376602406.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000002.1378342246.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 35K4Py4lii.exe, 00000000.00000003.1376857354.00000000015BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000B8600 | 0_2_000B8600 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000BB100 | 0_2_000BB100 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0019601A | 0_2_0019601A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025A023 | 0_2_0025A023 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00146000 | 0_2_00146000 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00130027 | 0_2_00130027 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00142029 | 0_2_00142029 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A0027 | 0_2_001A0027 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015E057 | 0_2_0015E057 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00144077 | 0_2_00144077 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0026004C | 0_2_0026004C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013E068 | 0_2_0013E068 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00222059 | 0_2_00222059 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E008F | 0_2_001E008F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DC09E | 0_2_000DC09E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B0085 | 0_2_001B0085 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00278087 | 0_2_00278087 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00232081 | 0_2_00232081 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017A0A4 | 0_2_0017A0A4 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00214098 | 0_2_00214098 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DA0CA | 0_2_000DA0CA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001760C7 | 0_2_001760C7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001CA0CF | 0_2_001CA0CF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020A0C2 | 0_2_0020A0C2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000C60E9 | 0_2_000C60E9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001FA0F8 | 0_2_001FA0F8 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025C0C2 | 0_2_0025C0C2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DC0E6 | 0_2_000DC0E6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002480CA | 0_2_002480CA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F60F0 | 0_2_001F60F0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016A0E7 | 0_2_0016A0E7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020E0D1 | 0_2_0020E0D1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001AC0EF | 0_2_001AC0EF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002240D5 | 0_2_002240D5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015C0E9 | 0_2_0015C0E9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D2118 | 0_2_001D2118 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013811F | 0_2_0013811F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013C106 | 0_2_0013C106 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00134105 | 0_2_00134105 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025613F | 0_2_0025613F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00226100 | 0_2_00226100 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011613A | 0_2_0011613A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001FE12F | 0_2_001FE12F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B412A | 0_2_001B412A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C012F | 0_2_001C012F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015412E | 0_2_0015412E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0019C15C | 0_2_0019C15C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0026E160 | 0_2_0026E160 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011A159 | 0_2_0011A159 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014A15D | 0_2_0014A15D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001DA154 | 0_2_001DA154 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00258168 | 0_2_00258168 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025E16A | 0_2_0025E16A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DC09E | 0_2_000DC09E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00136146 | 0_2_00136146 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00112172 | 0_2_00112172 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00204144 | 0_2_00204144 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000C8169 | 0_2_000C8169 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017E170 | 0_2_0017E170 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000B6160 | 0_2_000B6160 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00244151 | 0_2_00244151 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BC19A | 0_2_001BC19A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013019B | 0_2_0013019B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DE180 | 0_2_000DE180 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002061BB | 0_2_002061BB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001DE1BC | 0_2_001DE1BC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001801B2 | 0_2_001801B2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018A1A9 | 0_2_0018A1A9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001EE1A5 | 0_2_001EE1A5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001DC1D9 | 0_2_001DC1D9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A01D2 | 0_2_001A01D2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001261DC | 0_2_001261DC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020A1F5 | 0_2_0020A1F5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D81EA | 0_2_000D81EA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021C1DD | 0_2_0021C1DD |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00146212 | 0_2_00146212 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A6214 | 0_2_001A6214 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024C235 | 0_2_0024C235 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F0203 | 0_2_001F0203 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023023C | 0_2_0023023C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025020C | 0_2_0025020C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000CE220 | 0_2_000CE220 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C2220 | 0_2_001C2220 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F2221 | 0_2_001F2221 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020021F | 0_2_0020021F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021621E | 0_2_0021621E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D627B | 0_2_001D627B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00166278 | 0_2_00166278 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000B4270 | 0_2_000B4270 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E6297 | 0_2_001E6297 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BA28A | 0_2_001BA28A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002362B1 | 0_2_002362B1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002082B3 | 0_2_002082B3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A428D | 0_2_001A428D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001AA280 | 0_2_001AA280 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001922B4 | 0_2_001922B4 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C62A6 | 0_2_001C62A6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D42A1 | 0_2_001D42A1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F42A3 | 0_2_001F42A3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001242D2 | 0_2_001242D2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B62C3 | 0_2_001B62C3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D42D0 | 0_2_000D42D0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002022C4 | 0_2_002022C4 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002462C3 | 0_2_002462C3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001622EC | 0_2_001622EC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00228326 | 0_2_00228326 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D8312 | 0_2_001D8312 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023C331 | 0_2_0023C331 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022A337 | 0_2_0022A337 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012230D | 0_2_0012230D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001CA33C | 0_2_001CA33C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B0338 | 0_2_001B0338 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018833E | 0_2_0018833E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E2333 | 0_2_001E2333 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016E338 | 0_2_0016E338 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00114320 | 0_2_00114320 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00178320 | 0_2_00178320 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024A313 | 0_2_0024A313 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018E322 | 0_2_0018E322 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D0354 | 0_2_001D0354 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00210340 | 0_2_00210340 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00220348 | 0_2_00220348 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001EA39D | 0_2_001EA39D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00198390 | 0_2_00198390 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011E382 | 0_2_0011E382 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A8389 | 0_2_001A8389 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017C380 | 0_2_0017C380 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012A38A | 0_2_0012A38A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002183B9 | 0_2_002183B9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E8380 | 0_2_001E8380 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001803B1 | 0_2_001803B1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001763A7 | 0_2_001763A7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013E3AF | 0_2_0013E3AF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024E399 | 0_2_0024E399 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025A3F5 | 0_2_0025A3F5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002043F7 | 0_2_002043F7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012C3FA | 0_2_0012C3FA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00252425 | 0_2_00252425 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020242E | 0_2_0020242E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00168405 | 0_2_00168405 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00116433 | 0_2_00116433 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023E406 | 0_2_0023E406 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015C43B | 0_2_0015C43B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014643B | 0_2_0014643B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014045D | 0_2_0014045D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014245D | 0_2_0014245D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000EA440 | 0_2_000EA440 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E844A | 0_2_001E844A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00232444 | 0_2_00232444 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000F0460 | 0_2_000F0460 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00160465 | 0_2_00160465 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022A4A5 | 0_2_0022A4A5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0019A495 | 0_2_0019A495 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BE48F | 0_2_001BE48F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002164BE | 0_2_002164BE |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017A4B7 | 0_2_0017A4B7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001524A5 | 0_2_001524A5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D44A9 | 0_2_001D44A9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C44D9 | 0_2_001C44D9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D04C6 | 0_2_000D04C6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001AC4CC | 0_2_001AC4CC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001384C9 | 0_2_001384C9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001FA4FF | 0_2_001FA4FF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002224C0 | 0_2_002224C0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D24E0 | 0_2_000D24E0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014E500 | 0_2_0014E500 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DC53C | 0_2_000DC53C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00258564 | 0_2_00258564 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016A554 | 0_2_0016A554 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F255D | 0_2_001F255D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00248567 | 0_2_00248567 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020E56F | 0_2_0020E56F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A0541 | 0_2_001A0541 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0026C57A | 0_2_0026C57A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00204548 | 0_2_00204548 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D4560 | 0_2_000D4560 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00176562 | 0_2_00176562 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016258E | 0_2_0016258E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000EC5A0 | 0_2_000EC5A0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001FC5AF | 0_2_001FC5AF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001285AF | 0_2_001285AF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001185DD | 0_2_001185DD |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002305F1 | 0_2_002305F1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025C5F1 | 0_2_0025C5F1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000EA5D4 | 0_2_000EA5D4 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020A5FF | 0_2_0020A5FF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023A5D2 | 0_2_0023A5D2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002065D2 | 0_2_002065D2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001125E8 | 0_2_001125E8 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000B65F0 | 0_2_000B65F0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00156617 | 0_2_00156617 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00136615 | 0_2_00136615 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017E61F | 0_2_0017E61F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E0606 | 0_2_001E0606 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025263A | 0_2_0025263A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011A639 | 0_2_0011A639 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000CE630 | 0_2_000CE630 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A665B | 0_2_001A665B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014A650 | 0_2_0014A650 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B4656 | 0_2_001B4656 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00130641 | 0_2_00130641 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000E8650 | 0_2_000E8650 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00234645 | 0_2_00234645 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012E67D | 0_2_0012E67D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F6670 | 0_2_001F6670 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021C651 | 0_2_0021C651 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BC66F | 0_2_001BC66F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00176661 | 0_2_00176661 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015466E | 0_2_0015466E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00110690 | 0_2_00110690 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002366A1 | 0_2_002366A1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C269F | 0_2_001C269F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000BE687 | 0_2_000BE687 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002086B9 | 0_2_002086B9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BA686 | 0_2_001BA686 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016A6B7 | 0_2_0016A6B7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00276680 | 0_2_00276680 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00246683 | 0_2_00246683 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025E698 | 0_2_0025E698 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B86DB | 0_2_001B86DB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002206E6 | 0_2_002206E6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020C6EF | 0_2_0020C6EF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001806CB | 0_2_001806CB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D46D0 | 0_2_000D46D0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002246FC | 0_2_002246FC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018C6FB | 0_2_0018C6FB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D66F8 | 0_2_001D66F8 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017C6F0 | 0_2_0017C6F0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013E6E0 | 0_2_0013E6E0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B26E2 | 0_2_001B26E2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000F06F0 | 0_2_000F06F0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C871D | 0_2_001C871D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018871D | 0_2_0018871D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022E72A | 0_2_0022E72A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014471B | 0_2_0014471B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012670F | 0_2_0012670F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B673E | 0_2_001B673E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023E706 | 0_2_0023E706 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001DA734 | 0_2_001DA734 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018E737 | 0_2_0018E737 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011E721 | 0_2_0011E721 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00242760 | 0_2_00242760 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00114757 | 0_2_00114757 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012A744 | 0_2_0012A744 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000C2750 | 0_2_000C2750 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021E740 | 0_2_0021E740 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D0770 | 0_2_001D0770 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00190760 | 0_2_00190760 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00192763 | 0_2_00192763 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002407A6 | 0_2_002407A6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017A793 | 0_2_0017A793 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016879E | 0_2_0016879E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E2790 | 0_2_001E2790 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001827BE | 0_2_001827BE |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012C7BA | 0_2_0012C7BA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022878E | 0_2_0022878E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020478D | 0_2_0020478D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001487D1 | 0_2_001487D1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002607F5 | 0_2_002607F5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001EC7C8 | 0_2_001EC7C8 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BE7ED | 0_2_001BE7ED |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001CE80C | 0_2_001CE80C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E4801 | 0_2_001E4801 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F683E | 0_2_001F683E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F882F | 0_2_001F882F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00212817 | 0_2_00212817 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000BC840 | 0_2_000BC840 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021686D | 0_2_0021686D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022A86F | 0_2_0022A86F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024E851 | 0_2_0024E851 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00202857 | 0_2_00202857 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023E8A0 | 0_2_0023E8A0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A4888 | 0_2_001A4888 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022C8B0 | 0_2_0022C8B0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00150883 | 0_2_00150883 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001FE882 | 0_2_001FE882 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000CC8A0 | 0_2_000CC8A0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001408BA | 0_2_001408BA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C08AB | 0_2_001C08AB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000E88B0 | 0_2_000E88B0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001348AC | 0_2_001348AC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021C8EA | 0_2_0021C8EA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013A8F6 | 0_2_0013A8F6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025E8D2 | 0_2_0025E8D2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F08E6 | 0_2_001F08E6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00130910 | 0_2_00130910 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018A91B | 0_2_0018A91B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020092A | 0_2_0020092A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018C913 | 0_2_0018C913 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023892C | 0_2_0023892C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D6910 | 0_2_000D6910 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012093A | 0_2_0012093A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024890C | 0_2_0024890C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00222969 | 0_2_00222969 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00158947 | 0_2_00158947 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C297F | 0_2_001C297F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00194972 | 0_2_00194972 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000CE960 | 0_2_000CE960 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00182968 | 0_2_00182968 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00124964 | 0_2_00124964 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00118969 | 0_2_00118969 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017E96F | 0_2_0017E96F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001DE966 | 0_2_001DE966 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001FC963 | 0_2_001FC963 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023A9A2 | 0_2_0023A9A2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016C995 | 0_2_0016C995 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002329AF | 0_2_002329AF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002809B9 | 0_2_002809B9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001629B6 | 0_2_001629B6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001969BC | 0_2_001969BC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E69B4 | 0_2_001E69B4 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B49B5 | 0_2_001B49B5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024499F | 0_2_0024499F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001709D7 | 0_2_001709D7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002349F6 | 0_2_002349F6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DC9EB | 0_2_000DC9EB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001AC9FC | 0_2_001AC9FC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002669CC | 0_2_002669CC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000F09E0 | 0_2_000F09E0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_002109D0 | 0_2_002109D0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00220A33 | 0_2_00220A33 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C4A39 | 0_2_001C4A39 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014AA3B | 0_2_0014AA3B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00112A25 | 0_2_00112A25 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013CA27 | 0_2_0013CA27 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00136A26 | 0_2_00136A26 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017CA22 | 0_2_0017CA22 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000ECA40 | 0_2_000ECA40 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020CA71 | 0_2_0020CA71 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001AAA49 | 0_2_001AAA49 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00258A52 | 0_2_00258A52 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BCA9B | 0_2_001BCA9B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00184A90 | 0_2_00184A90 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E2A92 | 0_2_001E2A92 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0019AAB6 | 0_2_0019AAB6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D8ABC | 0_2_000D8ABC |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00120AA1 | 0_2_00120AA1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00198ADF | 0_2_00198ADF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00252AEB | 0_2_00252AEB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00124AC0 | 0_2_00124AC0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012CAC1 | 0_2_0012CAC1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00250AF6 | 0_2_00250AF6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00114AF6 | 0_2_00114AF6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0019CAFE | 0_2_0019CAFE |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00214AC8 | 0_2_00214AC8 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00176AEF | 0_2_00176AEF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00154AE8 | 0_2_00154AE8 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00172B11 | 0_2_00172B11 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00224B2A | 0_2_00224B2A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00144B1D | 0_2_00144B1D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00148B1F | 0_2_00148B1F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00180B09 | 0_2_00180B09 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000C8B1B | 0_2_000C8B1B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BAB07 | 0_2_001BAB07 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00128B0F | 0_2_00128B0F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00242B06 | 0_2_00242B06 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00132B34 | 0_2_00132B34 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011EB39 | 0_2_0011EB39 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F4B34 | 0_2_001F4B34 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E8B33 | 0_2_001E8B33 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018EB28 | 0_2_0018EB28 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00126B24 | 0_2_00126B24 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011AB26 | 0_2_0011AB26 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00190B5B | 0_2_00190B5B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000BAB40 | 0_2_000BAB40 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001DCB73 | 0_2_001DCB73 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0012AB92 | 0_2_0012AB92 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025EBA4 | 0_2_0025EBA4 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00230BA7 | 0_2_00230BA7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000CEB80 | 0_2_000CEB80 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022EBB5 | 0_2_0022EBB5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00188B87 | 0_2_00188B87 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000B4BA0 | 0_2_000B4BA0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B2BAE | 0_2_001B2BAE |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00156BD5 | 0_2_00156BD5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D0BCB | 0_2_001D0BCB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00116BE8 | 0_2_00116BE8 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A8BE3 | 0_2_001A8BE3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00208BDB | 0_2_00208BDB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00174C12 | 0_2_00174C12 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A6C03 | 0_2_001A6C03 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00238C38 | 0_2_00238C38 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F8C39 | 0_2_001F8C39 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00150C3E | 0_2_00150C3E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00212C19 | 0_2_00212C19 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00138C5A | 0_2_00138C5A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001CEC4C | 0_2_001CEC4C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00110C4A | 0_2_00110C4A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0025AC44 | 0_2_0025AC44 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00260C41 | 0_2_00260C41 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00164C65 | 0_2_00164C65 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00198C6C | 0_2_00198C6C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00192C99 | 0_2_00192C99 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00256CA1 | 0_2_00256CA1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D4C93 | 0_2_001D4C93 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00142C9B | 0_2_00142C9B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022ACBB | 0_2_0022ACBB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000C4CA0 | 0_2_000C4CA0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023AC90 | 0_2_0023AC90 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00168CA3 | 0_2_00168CA3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00248C9C | 0_2_00248C9C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001BECA6 | 0_2_001BECA6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018CCD5 | 0_2_0018CCD5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E8CC9 | 0_2_001E8CC9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D8CC6 | 0_2_001D8CC6 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015CCF4 | 0_2_0015CCF4 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C2CF5 | 0_2_001C2CF5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00146CFA | 0_2_00146CFA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00144CE5 | 0_2_00144CE5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00218CD5 | 0_2_00218CD5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016CCED | 0_2_0016CCED |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00246D20 | 0_2_00246D20 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021AD29 | 0_2_0021AD29 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00200D2D | 0_2_00200D2D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014ED04 | 0_2_0014ED04 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00240D35 | 0_2_00240D35 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D6D2E | 0_2_000D6D2E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014CD30 | 0_2_0014CD30 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000F0D20 | 0_2_000F0D20 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0022CD16 | 0_2_0022CD16 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C8D29 | 0_2_001C8D29 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00244D11 | 0_2_00244D11 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DCD4C | 0_2_000DCD4C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00212D65 | 0_2_00212D65 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DCD5E | 0_2_000DCD5E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015ED4F | 0_2_0015ED4F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00216D40 | 0_2_00216D40 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001AED7D | 0_2_001AED7D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00194D6B | 0_2_00194D6B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001C6D6B | 0_2_001C6D6B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001D2D6A | 0_2_001D2D6A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0013AD97 | 0_2_0013AD97 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00166D90 | 0_2_00166D90 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00182D91 | 0_2_00182D91 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001CCDBD | 0_2_001CCDBD |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00134DB9 | 0_2_00134DB9 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00210D8F | 0_2_00210D8F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001B4DAB | 0_2_001B4DAB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001CADAD | 0_2_001CADAD |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020ED9C | 0_2_0020ED9C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E4DA0 | 0_2_001E4DA0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001ACDDF | 0_2_001ACDDF |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0019ADDE | 0_2_0019ADDE |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001E6DC7 | 0_2_001E6DC7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0014ADF1 | 0_2_0014ADF1 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F6DF3 | 0_2_001F6DF3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001FADE7 | 0_2_001FADE7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000ECDF0 | 0_2_000ECDF0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011EE15 | 0_2_0011EE15 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00112E1B | 0_2_00112E1B |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00222E28 | 0_2_00222E28 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F0E03 | 0_2_001F0E03 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023EE07 | 0_2_0023EE07 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00132E36 | 0_2_00132E36 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00220E0A | 0_2_00220E0A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00206E0A | 0_2_00206E0A |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00332E72 | 0_2_00332E72 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0027EE6E | 0_2_0027EE6E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000BCE45 | 0_2_000BCE45 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00236E75 | 0_2_00236E75 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D2E6D | 0_2_000D2E6D |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000D0E6C | 0_2_000D0E6C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00252E40 | 0_2_00252E40 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021CE47 | 0_2_0021CE47 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00154E7C | 0_2_00154E7C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001F2E73 | 0_2_001F2E73 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000DEE63 | 0_2_000DEE63 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0021EE53 | 0_2_0021EE53 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00170E64 | 0_2_00170E64 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017EE64 | 0_2_0017EE64 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00122E94 | 0_2_00122E94 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0020AEA7 | 0_2_0020AEA7 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00114EB5 | 0_2_00114EB5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0016EEB2 | 0_2_0016EEB2 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024CE80 | 0_2_0024CE80 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00120EBB | 0_2_00120EBB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000E8EA0 | 0_2_000E8EA0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00250E92 | 0_2_00250E92 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000B2EB0 | 0_2_000B2EB0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000CAEB0 | 0_2_000CAEB0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001A0ED3 | 0_2_001A0ED3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0023CEEA | 0_2_0023CEEA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0015CEC5 | 0_2_0015CEC5 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00204EFE | 0_2_00204EFE |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00244EFB | 0_2_00244EFB |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00234EC0 | 0_2_00234EC0 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0024AED3 | 0_2_0024AED3 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00228EDA | 0_2_00228EDA |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0017CF1E | 0_2_0017CF1E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0011AF1E | 0_2_0011AF1E |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00124F09 | 0_2_00124F09 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00128F0F | 0_2_00128F0F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00148F24 | 0_2_00148F24 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00152F23 | 0_2_00152F23 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00252F13 | 0_2_00252F13 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_0018AF4F | 0_2_0018AF4F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_000C6F52 | 0_2_000C6F52 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_00214F45 | 0_2_00214F45 |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001DAF6C | 0_2_001DAF6C |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | Code function: 0_2_001CEF6F | 0_2_001CEF6F |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 285D22 second address: 285D41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 pushad 0x00000008 jmp 00007FA458C3691Fh 0x0000000d jbe 00007FA458C36916h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 284DFD second address: 284E01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2851FA second address: 28520C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C3691Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 28520C second address: 285241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA4591E8382h 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 jmp 00007FA4591E8385h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 28904B second address: 2890A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36921h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d jmp 00007FA458C3691Eh 0x00000012 push edx 0x00000013 pop edx 0x00000014 popad 0x00000015 jmp 00007FA458C36923h 0x0000001a popad 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f ja 00007FA458C3691Eh 0x00000025 mov eax, dword ptr [eax] 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b jng 00007FA458C36916h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2890A7 second address: 2890AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2890AB second address: 2890B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2891FD second address: 289203 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289203 second address: 289228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 xor dword ptr [esp], 1E62B5FEh 0x0000000c mov esi, dword ptr [ebp+122D2D4Fh] 0x00000012 lea ebx, dword ptr [ebp+12453F83h] 0x00000018 sub dword ptr [ebp+122D1CCCh], ebx 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 push esi 0x00000024 pop esi 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289228 second address: 289237 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289237 second address: 28923C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 28923C second address: 289242 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289333 second address: 289338 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289338 second address: 28937C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007FA4591E8383h 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 pushad 0x00000015 jmp 00007FA4591E8389h 0x0000001a push eax 0x0000001b push edx 0x0000001c jp 00007FA4591E8376h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 28937C second address: 289380 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289380 second address: 2893AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jnl 00007FA4591E8376h 0x00000012 jmp 00007FA4591E8388h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2893AB second address: 2893B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2893B1 second address: 2893E9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 pop eax 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 pop eax 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 popad 0x0000001a pop eax 0x0000001b mov esi, dword ptr [ebp+122D2ADBh] 0x00000021 lea ebx, dword ptr [ebp+12453F8Ch] 0x00000027 mov dword ptr [ebp+122D1A00h], edi 0x0000002d push eax 0x0000002e push eax 0x0000002f push edx 0x00000030 js 00007FA4591E837Ch 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2893E9 second address: 2893ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289443 second address: 28944D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FA4591E8376h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 28944D second address: 289471 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b add di, E900h 0x00000010 push 00000000h 0x00000012 jns 00007FA458C36919h 0x00000018 push 7C91D2A2h 0x0000001d pushad 0x0000001e push edi 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289471 second address: 289487 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA4591E837Fh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289487 second address: 28951F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xor dword ptr [esp], 7C91D222h 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007FA458C36918h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 00000017h 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 call 00007FA458C36924h 0x0000002d mov dword ptr [ebp+122D1C38h], edi 0x00000033 pop ecx 0x00000034 push 00000003h 0x00000036 push 00000000h 0x00000038 push esi 0x00000039 call 00007FA458C36918h 0x0000003e pop esi 0x0000003f mov dword ptr [esp+04h], esi 0x00000043 add dword ptr [esp+04h], 00000016h 0x0000004b inc esi 0x0000004c push esi 0x0000004d ret 0x0000004e pop esi 0x0000004f ret 0x00000050 mov edx, dword ptr [ebp+122D1BC3h] 0x00000056 jno 00007FA458C3691Ch 0x0000005c push 00000000h 0x0000005e mov dword ptr [ebp+122D1C58h], ecx 0x00000064 push 00000003h 0x00000066 mov dl, ah 0x00000068 push EBB0E3B0h 0x0000006d pushad 0x0000006e push edi 0x0000006f ja 00007FA458C36916h 0x00000075 pop edi 0x00000076 push eax 0x00000077 push edx 0x00000078 push eax 0x00000079 push edx 0x0000007a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 28951F second address: 289523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 289523 second address: 289552 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36920h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a xor dword ptr [esp], 2BB0E3B0h 0x00000011 mov dword ptr [ebp+1244E303h], edx 0x00000017 lea ebx, dword ptr [ebp+12453F97h] 0x0000001d mov esi, ebx 0x0000001f push eax 0x00000020 pushad 0x00000021 push esi 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 27126D second address: 27129C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 pushad 0x00000008 jbe 00007FA4591E8376h 0x0000000e push edx 0x0000000f pop edx 0x00000010 popad 0x00000011 je 00007FA4591E8392h 0x00000017 jmp 00007FA4591E8386h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 27129C second address: 2712AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 push eax 0x00000006 pop eax 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2712AC second address: 2712B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2A8B2E second address: 2A8B44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA458C36916h 0x0000000a jmp 00007FA458C3691Bh 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2A8B44 second address: 2A8B57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jo 00007FA4591E8376h 0x00000009 jno 00007FA4591E8376h 0x0000000f pop eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2A8CD9 second address: 2A8CDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2A8F9D second address: 2A8FA8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007FA4591E8376h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 29E692 second address: 29E696 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2AA269 second address: 2AA26D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2AA695 second address: 2AA699 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2AA699 second address: 2AA6A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2AA6A1 second address: 2AA6A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2AA6A7 second address: 2AA6AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 29E68A second address: 29E692 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2AC72E second address: 2AC749 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA4591E8376h 0x0000000a jmp 00007FA4591E8380h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 27978E second address: 2797F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36925h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FA458C36928h 0x00000011 popad 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 jmp 00007FA458C36921h 0x0000001b jng 00007FA458C36916h 0x00000021 popad 0x00000022 pushad 0x00000023 push esi 0x00000024 pop esi 0x00000025 pushad 0x00000026 popad 0x00000027 jmp 00007FA458C3691Fh 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2797F4 second address: 2797F9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B061B second address: 2B061F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B061F second address: 2B0625 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B0625 second address: 2B062A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B0AA4 second address: 2B0AAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B0AAB second address: 2B0AB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B0C21 second address: 2B0C2B instructions: 0x00000000 rdtsc 0x00000002 je 00007FA4591E837Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2AFBC1 second address: 2AFBC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B49E6 second address: 2B49F2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B49F2 second address: 2B49F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B49F8 second address: 2B4A1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4591E8387h 0x00000009 popad 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B6F2D second address: 2B6F7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36925h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 4EE17F0Ah 0x00000010 push 00000000h 0x00000012 push edx 0x00000013 call 00007FA458C36918h 0x00000018 pop edx 0x00000019 mov dword ptr [esp+04h], edx 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc edx 0x00000026 push edx 0x00000027 ret 0x00000028 pop edx 0x00000029 ret 0x0000002a call 00007FA458C36919h 0x0000002f push ecx 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B6F7A second address: 2B6FA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 pushad 0x00000009 ja 00007FA4591E8378h 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 jnp 00007FA4591E8376h 0x00000018 popad 0x00000019 popad 0x0000001a mov eax, dword ptr [esp+04h] 0x0000001e push edi 0x0000001f jbe 00007FA4591E837Ch 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B6FA3 second address: 2B6FC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 mov eax, dword ptr [eax] 0x00000007 jmp 00007FA458C36925h 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push edx 0x00000014 pop edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B6FC8 second address: 2B6FE0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA4591E8380h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B70F4 second address: 2B710B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA458C36923h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B710B second address: 2B710F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7414 second address: 2B7426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 jl 00007FA458C36920h 0x0000000d pushad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B75A4 second address: 2B75B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7674 second address: 2B768B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C3691Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B768B second address: 2B7695 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA4591E8376h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7BED second address: 2B7BF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7BF1 second address: 2B7C09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA4591E837Eh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7C09 second address: 2B7C0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7DA8 second address: 2B7DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7DAC second address: 2B7DC1 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA458C36916h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FA458C36916h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7DC1 second address: 2B7DC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7F72 second address: 2B7F76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B7F76 second address: 2B7F90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 jl 00007FA4591E8388h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FA4591E837Ah 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B8F86 second address: 2B8F90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B8F90 second address: 2B8F94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BAB53 second address: 2BAB59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BAB59 second address: 2BAB5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BAB5D second address: 2BABCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push eax 0x0000000e call 00007FA458C36918h 0x00000013 pop eax 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 add dword ptr [esp+04h], 00000018h 0x00000020 inc eax 0x00000021 push eax 0x00000022 ret 0x00000023 pop eax 0x00000024 ret 0x00000025 push 00000000h 0x00000027 jmp 00007FA458C36920h 0x0000002c push 00000000h 0x0000002e movzx edi, cx 0x00000031 xchg eax, ebx 0x00000032 jo 00007FA458C36924h 0x00000038 jmp 00007FA458C3691Eh 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 jmp 00007FA458C3691Bh 0x00000046 jng 00007FA458C36916h 0x0000004c popad 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BABCA second address: 2BABD1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BB55D second address: 2BB5D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007FA458C3691Ch 0x0000000b popad 0x0000000c push eax 0x0000000d jmp 00007FA458C3691Dh 0x00000012 nop 0x00000013 push 00000000h 0x00000015 push edx 0x00000016 call 00007FA458C36918h 0x0000001b pop edx 0x0000001c mov dword ptr [esp+04h], edx 0x00000020 add dword ptr [esp+04h], 00000016h 0x00000028 inc edx 0x00000029 push edx 0x0000002a ret 0x0000002b pop edx 0x0000002c ret 0x0000002d xor di, 00C3h 0x00000032 push 00000000h 0x00000034 pushad 0x00000035 sub ebx, dword ptr [ebp+122D2A53h] 0x0000003b mov ecx, dword ptr [ebp+122D2DF6h] 0x00000041 popad 0x00000042 push 00000000h 0x00000044 mov edi, dword ptr [ebp+122D2D2Bh] 0x0000004a xchg eax, ebx 0x0000004b jbe 00007FA458C36935h 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007FA458C3691Eh 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BDB5E second address: 2BDB64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BDB64 second address: 2BDB72 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA458C36918h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BDB72 second address: 2BDB78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BDB78 second address: 2BDB7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BE242 second address: 2BE270 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8380h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FA4591E8383h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BE270 second address: 2BE2E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C3691Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007FA458C36918h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000019h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push esi 0x0000002a call 00007FA458C36918h 0x0000002f pop esi 0x00000030 mov dword ptr [esp+04h], esi 0x00000034 add dword ptr [esp+04h], 0000001Ah 0x0000003c inc esi 0x0000003d push esi 0x0000003e ret 0x0000003f pop esi 0x00000040 ret 0x00000041 mov di, 30E6h 0x00000045 mov edi, dword ptr [ebp+122D1CD6h] 0x0000004b push 00000000h 0x0000004d push ecx 0x0000004e and di, C826h 0x00000053 pop edi 0x00000054 push eax 0x00000055 je 00007FA458C36920h 0x0000005b pushad 0x0000005c pushad 0x0000005d popad 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BF583 second address: 2BF5A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA4591E8376h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FA4591E837Fh 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C3E4E second address: 2C3ED2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36927h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007FA458C36918h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 00000019h 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 movzx ebx, si 0x0000002a mov dword ptr [ebp+122D1C40h], ecx 0x00000030 push 00000000h 0x00000032 mov dword ptr [ebp+1247C09Dh], edx 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push ebx 0x0000003d call 00007FA458C36918h 0x00000042 pop ebx 0x00000043 mov dword ptr [esp+04h], ebx 0x00000047 add dword ptr [esp+04h], 0000001Ch 0x0000004f inc ebx 0x00000050 push ebx 0x00000051 ret 0x00000052 pop ebx 0x00000053 ret 0x00000054 or ebx, 77A54DA2h 0x0000005a xchg eax, esi 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e push edx 0x0000005f pushad 0x00000060 popad 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C3ED2 second address: 2C3EE3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C5E88 second address: 2C5EB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jbe 00007FA458C36916h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 js 00007FA458C36916h 0x0000001b jmp 00007FA458C36925h 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C4FBC second address: 2C4FC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C4FC0 second address: 2C4FC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C4FC4 second address: 2C4FD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C60BE second address: 2C60D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FA458C36916h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007FA458C36916h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C6EA4 second address: 2C6EAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C6EAE second address: 2C6EB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C5068 second address: 2C506C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C506C second address: 2C5072 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C6FEA second address: 2C7011 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jnl 00007FA4591E8376h 0x00000012 jc 00007FA4591E8376h 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C7E79 second address: 2C7F02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FA458C36916h 0x00000009 jns 00007FA458C36916h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 jmp 00007FA458C3691Fh 0x00000018 nop 0x00000019 push 00000000h 0x0000001b push eax 0x0000001c call 00007FA458C36918h 0x00000021 pop eax 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 add dword ptr [esp+04h], 00000016h 0x0000002e inc eax 0x0000002f push eax 0x00000030 ret 0x00000031 pop eax 0x00000032 ret 0x00000033 mov dword ptr [ebp+122D1A69h], edx 0x00000039 push 00000000h 0x0000003b mov edi, 59C04A4Fh 0x00000040 push 00000000h 0x00000042 push 00000000h 0x00000044 push ebx 0x00000045 call 00007FA458C36918h 0x0000004a pop ebx 0x0000004b mov dword ptr [esp+04h], ebx 0x0000004f add dword ptr [esp+04h], 00000015h 0x00000057 inc ebx 0x00000058 push ebx 0x00000059 ret 0x0000005a pop ebx 0x0000005b ret 0x0000005c mov edi, dword ptr [ebp+1246D3D2h] 0x00000062 mov edi, 6B5B9A73h 0x00000067 push eax 0x00000068 pushad 0x00000069 jnl 00007FA458C3691Ch 0x0000006f push esi 0x00000070 push eax 0x00000071 push edx 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C7011 second address: 2C7015 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C7015 second address: 2C70BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007FA458C36918h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 mov bx, 218Dh 0x00000026 push dword ptr fs:[00000000h] 0x0000002d mov dword ptr [ebp+122D1FDBh], ecx 0x00000033 mov dword ptr fs:[00000000h], esp 0x0000003a mov edi, 4128A518h 0x0000003f mov eax, dword ptr [ebp+122D14E5h] 0x00000045 push 00000000h 0x00000047 push edi 0x00000048 call 00007FA458C36918h 0x0000004d pop edi 0x0000004e mov dword ptr [esp+04h], edi 0x00000052 add dword ptr [esp+04h], 0000001Dh 0x0000005a inc edi 0x0000005b push edi 0x0000005c ret 0x0000005d pop edi 0x0000005e ret 0x0000005f jmp 00007FA458C36922h 0x00000064 push FFFFFFFFh 0x00000066 mov dword ptr [ebp+1245495Ah], esi 0x0000006c nop 0x0000006d jg 00007FA458C36924h 0x00000073 push eax 0x00000074 pushad 0x00000075 push eax 0x00000076 push edx 0x00000077 pushad 0x00000078 popad 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C8DFE second address: 2C8E2F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8387h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA4591E8381h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C80C3 second address: 2C80CD instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA458C36916h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C8E2F second address: 2C8E40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C8E40 second address: 2C8EC8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FA458C36929h 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c jmp 00007FA458C36929h 0x00000011 push 00000000h 0x00000013 mov dword ptr [ebp+122D1AC1h], esi 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push edx 0x0000001e call 00007FA458C36918h 0x00000023 pop edx 0x00000024 mov dword ptr [esp+04h], edx 0x00000028 add dword ptr [esp+04h], 00000016h 0x00000030 inc edx 0x00000031 push edx 0x00000032 ret 0x00000033 pop edx 0x00000034 ret 0x00000035 mov bl, 4Ah 0x00000037 jg 00007FA458C3692Fh 0x0000003d xchg eax, esi 0x0000003e push ebx 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C8EC8 second address: 2C8ECC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C9092 second address: 2C909C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA458C36916h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2CAE35 second address: 2CAE39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2CDE32 second address: 2CDE36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2CEF3B second address: 2CEF42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2CEF42 second address: 2CEF47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2D01A8 second address: 2D01B9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 jng 00007FA4591E837Eh 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2D01B9 second address: 2D0241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ecx 0x00000009 call 00007FA458C36918h 0x0000000e pop ecx 0x0000000f mov dword ptr [esp+04h], ecx 0x00000013 add dword ptr [esp+04h], 00000017h 0x0000001b inc ecx 0x0000001c push ecx 0x0000001d ret 0x0000001e pop ecx 0x0000001f ret 0x00000020 push dword ptr fs:[00000000h] 0x00000027 push 00000000h 0x00000029 push ecx 0x0000002a call 00007FA458C36918h 0x0000002f pop ecx 0x00000030 mov dword ptr [esp+04h], ecx 0x00000034 add dword ptr [esp+04h], 00000017h 0x0000003c inc ecx 0x0000003d push ecx 0x0000003e ret 0x0000003f pop ecx 0x00000040 ret 0x00000041 mov edi, dword ptr [ebp+122D2D2Fh] 0x00000047 mov dword ptr fs:[00000000h], esp 0x0000004e add dword ptr [ebp+122D1BA3h], edx 0x00000054 mov eax, dword ptr [ebp+122D0A8Dh] 0x0000005a mov bl, F5h 0x0000005c push FFFFFFFFh 0x0000005e jmp 00007FA458C36921h 0x00000063 nop 0x00000064 push eax 0x00000065 push edx 0x00000066 jno 00007FA458C3691Ch 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2D0241 second address: 2D0247 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2D12E7 second address: 2D12F1 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA458C3691Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2D4486 second address: 2D448A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 27CEB7 second address: 27CEC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push esi 0x00000007 pop esi 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2DD3D7 second address: 2DD3DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2DCE2E second address: 2DCE34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2DCF86 second address: 2DCF9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007FA4591E837Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E1307 second address: 2E130C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E130C second address: 2E1321 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA4591E8380h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E1321 second address: 2E132E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E132E second address: 2E1345 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FA4591E837Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E6DE0 second address: 2E6DE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E6DE4 second address: 2E6DF8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FA4591E8382h 0x0000000c jng 00007FA4591E8376h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E6F6B second address: 2E6F70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E6F70 second address: 2E6F9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8385h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA4591E8381h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E6F9D second address: 2E6FA7 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA458C36916h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E7286 second address: 2E728A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E728A second address: 2E7299 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA458C36916h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2E7299 second address: 2E729F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EFCB6 second address: 2EFCE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA458C36926h 0x00000009 jmp 00007FA458C3691Bh 0x0000000e popad 0x0000000f pop ecx 0x00000010 push edx 0x00000011 jnc 00007FA458C3691Ch 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EE984 second address: 2EE98A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EEDD1 second address: 2EEDF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C3691Ch 0x00000007 pushad 0x00000008 jmp 00007FA458C36920h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EEF90 second address: 2EEF9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EEF9A second address: 2EEFC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA458C36920h 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FA458C3691Bh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EF2A9 second address: 2EF2B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EF2B2 second address: 2EF2F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 jg 00007FA458C36943h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EF2F0 second address: 2EF30C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4591E8388h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EF486 second address: 2EF48A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EFB37 second address: 2EFB3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EFB3D second address: 2EFB5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007FA458C3691Dh 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jnl 00007FA458C36916h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EE3DE second address: 2EE3E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EE3E2 second address: 2EE3FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36922h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EE3FC second address: 2EE400 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2EE400 second address: 2EE416 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FA458C36918h 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jno 00007FA458C36916h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2F4C16 second address: 2F4C30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push esi 0x00000007 pop esi 0x00000008 jmp 00007FA4591E8380h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2F4C30 second address: 2F4C3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FA458C36916h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2F551D second address: 2F5521 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2F57F5 second address: 2F57F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FC732 second address: 2FC736 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FC736 second address: 2FC748 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA458C36916h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b jno 00007FA458C36916h 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FC748 second address: 2FC758 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA4591E837Ah 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FC758 second address: 2FC75C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FC75C second address: 2FC782 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FA4591E837Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push ebx 0x0000000f jns 00007FA4591E8376h 0x00000015 js 00007FA4591E8376h 0x0000001b pop ebx 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BFF87 second address: 2BFF92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BFF92 second address: 2BFF96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2BFF96 second address: 29E692 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push esi 0x0000000b call 00007FA458C36918h 0x00000010 pop esi 0x00000011 mov dword ptr [esp+04h], esi 0x00000015 add dword ptr [esp+04h], 00000017h 0x0000001d inc esi 0x0000001e push esi 0x0000001f ret 0x00000020 pop esi 0x00000021 ret 0x00000022 lea eax, dword ptr [ebp+1248AC82h] 0x00000028 mov edx, ebx 0x0000002a mov edx, dword ptr [ebp+1247C25Dh] 0x00000030 nop 0x00000031 jmp 00007FA458C36929h 0x00000036 push eax 0x00000037 jmp 00007FA458C3691Bh 0x0000003c nop 0x0000003d jng 00007FA458C36926h 0x00000043 jmp 00007FA458C36920h 0x00000048 call dword ptr [ebp+122D1A3Eh] 0x0000004e push edx 0x0000004f jg 00007FA458C3691Eh 0x00000055 push eax 0x00000056 push edx 0x00000057 pushad 0x00000058 popad 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C00CB second address: 2C00E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4591E8388h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C00E8 second address: 2C00EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C00EE second address: 2C00F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0730 second address: 2C0791 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA458C36916h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c jmp 00007FA458C36927h 0x00000011 xchg eax, esi 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007FA458C36918h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 0000001Ch 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c jmp 00007FA458C3691Ch 0x00000031 push eax 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 push ebx 0x00000036 pop ebx 0x00000037 ja 00007FA458C36916h 0x0000003d popad 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0E42 second address: 2C0E46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0E46 second address: 2C0E4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C1227 second address: 2C122D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C12D6 second address: 2C12F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA458C36929h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FCE06 second address: 2FCE0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FD362 second address: 2FD36C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FA458C36916h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2FD36C second address: 2FD370 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3018D0 second address: 3018DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 304B8D second address: 304BA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FA4591E837Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 28049E second address: 2804E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FA458C36922h 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jnc 00007FA458C36916h 0x00000016 ja 00007FA458C36916h 0x0000001c popad 0x0000001d jmp 00007FA458C36924h 0x00000022 popad 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2804E2 second address: 2804E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2804E6 second address: 280516 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA458C36916h 0x00000008 jmp 00007FA458C36925h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 jmp 00007FA458C3691Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3043F7 second address: 304404 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pushad 0x00000006 popad 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 304404 second address: 30440B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 30440B second address: 304437 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8383h 0x00000007 pushad 0x00000008 push eax 0x00000009 pop eax 0x0000000a jmp 00007FA4591E8382h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3045AE second address: 3045B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3045B6 second address: 3045CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4591E837Eh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3045CD second address: 3045D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FA458C36916h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3045D7 second address: 3045F9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA4591E8376h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA4591E8383h 0x0000000f popad 0x00000010 pushad 0x00000011 push esi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3045F9 second address: 304607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA458C36916h 0x0000000a pop esi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 304607 second address: 304626 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4591E8389h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3048A9 second address: 3048AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3048AD second address: 3048B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3071A5 second address: 3071D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA458C3691Ch 0x00000009 pop esi 0x0000000a jg 00007FA458C3692Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 306D22 second address: 306D56 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Dh 0x00000007 jmp 00007FA4591E8385h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edi 0x0000000f jl 00007FA4591E8376h 0x00000015 jc 00007FA4591E8376h 0x0000001b pop edi 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 306D56 second address: 306D61 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 ja 00007FA458C36916h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 306ECD second address: 306ED2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 306ED2 second address: 306EF4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36920h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 26DCDF second address: 26DCE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 26DCE3 second address: 26DCE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 309F1D second address: 309F2F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 30E10B second address: 30E116 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 30E116 second address: 30E139 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4591E8389h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 30E454 second address: 30E492 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jns 00007FA458C36916h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007FA458C36927h 0x00000014 pop esi 0x00000015 jnc 00007FA458C36922h 0x0000001b jmp 00007FA458C3691Ch 0x00000020 pushad 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 30E492 second address: 30E498 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 315D0C second address: 315D12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 314981 second address: 31498F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA4591E8376h 0x0000000a pop edi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0C05 second address: 2C0C12 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0C12 second address: 2C0C16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0C16 second address: 2C0C98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA458C36922h 0x0000000b popad 0x0000000c nop 0x0000000d or ecx, dword ptr [ebp+122D2DECh] 0x00000013 mov ebx, dword ptr [ebp+1248ACC1h] 0x00000019 push 00000000h 0x0000001b push edx 0x0000001c call 00007FA458C36918h 0x00000021 pop edx 0x00000022 mov dword ptr [esp+04h], edx 0x00000026 add dword ptr [esp+04h], 0000001Ch 0x0000002e inc edx 0x0000002f push edx 0x00000030 ret 0x00000031 pop edx 0x00000032 ret 0x00000033 sub ecx, 65FD05CBh 0x00000039 add eax, ebx 0x0000003b push 00000000h 0x0000003d push edx 0x0000003e call 00007FA458C36918h 0x00000043 pop edx 0x00000044 mov dword ptr [esp+04h], edx 0x00000048 add dword ptr [esp+04h], 00000015h 0x00000050 inc edx 0x00000051 push edx 0x00000052 ret 0x00000053 pop edx 0x00000054 ret 0x00000055 mov cl, 86h 0x00000057 mov dword ptr [ebp+12463D6Ah], edi 0x0000005d push eax 0x0000005e push eax 0x0000005f push edx 0x00000060 push ebx 0x00000061 jo 00007FA458C36916h 0x00000067 pop ebx 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0C98 second address: 2C0CB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d sub ecx, dword ptr [ebp+122D2A0Fh] 0x00000013 push 00000004h 0x00000015 nop 0x00000016 jnl 00007FA4591E8398h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0CB8 second address: 2C0CBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2C0CBC second address: 2C0CEF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8386h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b ja 00007FA4591E8383h 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3159F8 second address: 3159FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3159FC second address: 315A16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8381h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a push ebx 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 319098 second address: 31909C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 31909C second address: 3190B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8387h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3190B7 second address: 3190C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FA458C36916h 0x00000009 jng 00007FA458C36916h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 276173 second address: 276199 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8389h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d pushad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 320E1B second address: 320E1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 320E1F second address: 320E2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jp 00007FA4591E8376h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 320E2F second address: 320E33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 320E33 second address: 320E37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 26F744 second address: 26F75E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FA458C36916h 0x0000000a popad 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007FA458C3691Ch 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 26F75E second address: 26F763 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 31F1CB second address: 31F1D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 31F1D2 second address: 31F1EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 jnl 00007FA4591E837Eh 0x0000000d pushad 0x0000000e push edx 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 31FFEA second address: 31FFEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 31FFEE second address: 320000 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007FA4591E8376h 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 pop eax 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 320000 second address: 320007 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 320871 second address: 32089C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007FA4591E8378h 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA4591E8387h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 32089C second address: 3208C7 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA458C36916h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA458C36929h 0x0000000f js 00007FA458C36922h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3208C7 second address: 3208CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3208CD second address: 3208D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 325E4C second address: 325E59 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pushad 0x00000008 push esi 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 325E59 second address: 325E8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnp 00007FA458C3692Bh 0x0000000b jnl 00007FA458C3691Ah 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 jnp 00007FA458C36916h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3250D9 second address: 3250DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 32523C second address: 325259 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push ebx 0x00000008 pushad 0x00000009 popad 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA458C3691Eh 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 325259 second address: 325277 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jl 00007FA4591E8398h 0x0000000d pushad 0x0000000e jmp 00007FA4591E837Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3256EA second address: 32570B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA458C36922h 0x0000000b popad 0x0000000c push ecx 0x0000000d pushad 0x0000000e push esi 0x0000000f pop esi 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 32570B second address: 325711 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 325711 second address: 32571E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FA458C36916h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 332E14 second address: 332E3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8383h 0x00000007 jc 00007FA4591E8378h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 332E3A second address: 332E3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 332E3E second address: 332E64 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007FA4591E8376h 0x0000000e jmp 00007FA4591E8388h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 333105 second address: 333109 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 333269 second address: 33327A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA4591E837Ch 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33327A second address: 333291 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA458C36923h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 333724 second address: 33372C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33372C second address: 33373D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA458C36916h 0x0000000a je 00007FA458C36916h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3338CD second address: 3338D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33406F second address: 33407B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jng 00007FA458C36916h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33407B second address: 33407F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33407F second address: 33409B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007FA458C3691Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33409B second address: 3340A7 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA4591E8376h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3340A7 second address: 3340AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33250F second address: 332515 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33A397 second address: 33A39D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33A39D second address: 33A3A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33A3A1 second address: 33A3A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33A3A5 second address: 33A3BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA4591E8382h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33A571 second address: 33A577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33A577 second address: 33A57F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 33A6DF second address: 33A6E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 34A043 second address: 34A04B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 34A04B second address: 34A050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 34A050 second address: 34A07B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop eax 0x00000006 jmp 00007FA4591E8380h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e jmp 00007FA4591E837Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 349A8D second address: 349A93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 349A93 second address: 349AD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jbe 00007FA4591E837Eh 0x0000000b jnc 00007FA4591E8376h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pushad 0x00000015 jbe 00007FA4591E8391h 0x0000001b jno 00007FA4591E8376h 0x00000021 jmp 00007FA4591E8385h 0x00000026 jo 00007FA4591E837Ch 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 34CB1C second address: 34CB4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push edi 0x00000006 pop edi 0x00000007 jnl 00007FA458C36916h 0x0000000d jmp 00007FA458C36921h 0x00000012 popad 0x00000013 pushad 0x00000014 jo 00007FA458C36916h 0x0000001a jg 00007FA458C36916h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 34CB4A second address: 34CB50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 34CB50 second address: 34CB5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jne 00007FA458C36916h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3533C6 second address: 3533CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3533CA second address: 3533CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3533CE second address: 3533D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 355636 second address: 35564E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FA458C36916h 0x0000000a popad 0x0000000b jng 00007FA458C3691Ah 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3663DB second address: 366401 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA4591E837Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA4591E837Bh 0x00000012 jnl 00007FA4591E8376h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 367CD1 second address: 367CDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36954E second address: 36955A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FA4591E8376h 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36955A second address: 36955E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36955E second address: 36956A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36956A second address: 36956E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 370291 second address: 3702C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E837Bh 0x00000007 jmp 00007FA4591E8386h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007FA4591E8382h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3702C8 second address: 3702F2 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA458C36925h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FA458C3691Dh 0x00000010 push ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3702F2 second address: 3702F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3702F8 second address: 370300 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36EE81 second address: 36EE89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36F0EC second address: 36F112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA458C3691Eh 0x00000009 jmp 00007FA458C36922h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36F112 second address: 36F11B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36F11B second address: 36F121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36F54E second address: 36F583 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a je 00007FA4591E8376h 0x00000010 jno 00007FA4591E8376h 0x00000016 jno 00007FA4591E8376h 0x0000001c jmp 00007FA4591E8384h 0x00000021 popad 0x00000022 push eax 0x00000023 push edx 0x00000024 push esi 0x00000025 pop esi 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36F583 second address: 36F587 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36FF87 second address: 36FF9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f jg 00007FA4591E8376h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36FF9C second address: 36FFA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36FFA0 second address: 36FFA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 36FFA6 second address: 36FFAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 377F1F second address: 377F23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 377F23 second address: 377F27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 377F27 second address: 377F50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FA4591E8376h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007FA4591E8376h 0x00000014 jmp 00007FA4591E8385h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 377F50 second address: 377F5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 377F5A second address: 377F64 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA4591E8376h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 377D9F second address: 377DA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 377DA3 second address: 377DA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 26DCC5 second address: 26DCDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA458C36916h 0x0000000a jmp 00007FA458C3691Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 384CF4 second address: 384CF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 384CF9 second address: 384CFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3871A6 second address: 3871C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FA4591E8386h 0x0000000c jnp 00007FA4591E8376h 0x00000012 jmp 00007FA4591E837Ah 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 393388 second address: 3933A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA458C36924h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3933A0 second address: 3933A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3933A6 second address: 3933BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA458C36922h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AB664 second address: 3AB670 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FA4591E8376h 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AA92A second address: 3AA930 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AA930 second address: 3AA935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AB212 second address: 3AB219 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AB356 second address: 3AB381 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA4591E8382h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FA4591E8381h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AB381 second address: 3AB397 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C3691Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AE1D1 second address: 3AE1DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AE26F second address: 3AE274 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AE52D second address: 3AE531 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3AF81D second address: 3AF829 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007FA458C36916h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3B160A second address: 3B163A instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA4591E839Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 3B163A second address: 3B164F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA458C36921h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B9D26 second address: 2B9D2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\35K4Py4lii.exe | RDTSC instruction interceptor: First address: 2B9D2A second address: 2B9D34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FA458C36916h 0x0000000a rdtsc |