Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowere |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1514353743.0000000005CCA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1488959320.0000000001360000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1515928263.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1488193272.000000000135F000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1565220310.0000000001360000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1513284186.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539309056.0000000001360000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstati |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1516348850.0000000005CB8000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208. |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1541193562.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1565070208.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1540810685.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1542630820.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539246157.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&cta |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steam |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1488231577.000000000131E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.F |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=englis |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/s |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&a |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shar |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1516348850.0000000005CB8000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1541193562.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1565070208.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1540810685.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1542630820.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539246157.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539246157.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1539369110.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1516348850.0000000005CB8000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1513284186.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1582545384.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539309056.0000000001360000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1539309056.0000000001360000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com//Passw |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.00000000012F9000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/3 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1488959320.0000000001360000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1515928263.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1488193272.000000000135F000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1513284186.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539309056.0000000001360000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ARE |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1513399465.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539387547.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1543528478.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1488231577.000000000131E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/J |
Source: 4KDKJjRzm8.exe, 4KDKJjRzm8.exe, 00000000.00000003.1610641364.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1613444081.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1613613036.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1565125707.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614536555.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614720928.000000000131E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1539387547.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1543528478.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1488231577.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1513371568.000000000132D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api) |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apih |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1613301096.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1582545384.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apilT |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1539309056.0000000001360000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apin |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515928263.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1513284186.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apitly |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001361000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1613301096.0000000001366000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001366000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/iaj |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515928263.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1513284186.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539309056.0000000001360000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ients/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1613301096.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1513284186.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi0 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1543231877.000000000136F000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1542773608.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1565125707.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1582545384.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539309056.0000000001360000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi4 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1488959320.0000000001360000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1488193272.000000000135F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piD |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1613301096.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1582545384.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pitT |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1613301096.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1582545384.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/qo |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1565125707.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1582545384.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/s |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1613301096.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1565125707.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1610249625.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000002.1614778336.0000000001370000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1582545384.0000000001370000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/srd |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1565125707.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/stT |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1565125707.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/te |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/i |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowe |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.00000000012DC000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1541193562.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1565070208.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1540810685.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1542630820.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1539246157.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5 |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1465201943.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465087302.0000000005C5C000.00000004.00000800.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1465001687.0000000005C5F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1516290444.0000000005CB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.HCe2hc5EPKfq |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.oX6J3D7V9Efv |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1515973644.0000000005D46000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1437919303.000000000136D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: 4KDKJjRzm8.exe, 00000000.00000003.1466309055.000000000135D000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1466220436.000000000131E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1438106482.000000000132E000.00000004.00000020.00020000.00000000.sdmp, 4KDKJjRzm8.exe, 00000000.00000003.1437953868.000000000132E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009C0460 | 0_2_009C0460 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009BC5A0 | 0_2_009BC5A0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0098E687 | 0_2_0098E687 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00988600 | 0_2_00988600 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0099C8A0 | 0_2_0099C8A0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009C0D20 | 0_2_009C0D20 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009B8EA0 | 0_2_009B8EA0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0098CE45 | 0_2_0098CE45 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0098B100 | 0_2_0098B100 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009B9280 | 0_2_009B9280 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00991227 | 0_2_00991227 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AD34A | 0_2_009AD34A |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A7440 | 0_2_009A7440 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009957C0 | 0_2_009957C0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A1D00 | 0_2_009A1D00 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AC09E | 0_2_009AC09E |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A000B1 | 0_2_00A000B1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A540B4 | 0_2_00A540B4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A420BA | 0_2_00A420BA |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0609C | 0_2_00A0609C |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A240EF | 0_2_00A240EF |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AA0CA | 0_2_009AA0CA |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A6A0FE | 0_2_00A6A0FE |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F60C2 | 0_2_009F60C2 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1E0C0 | 0_2_00A1E0C0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A560C1 | 0_2_00A560C1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A800CD | 0_2_00A800CD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB60CE | 0_2_00AB60CE |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A740C1 | 0_2_00A740C1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F00F4 | 0_2_009F00F4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2C0CD | 0_2_00A2C0CD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009960E9 | 0_2_009960E9 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AC0E6 | 0_2_009AC0E6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8C02A | 0_2_00A8C02A |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC4008 | 0_2_00AC4008 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1C00B | 0_2_00A1C00B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA4018 | 0_2_00AA4018 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A92060 | 0_2_00A92060 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD6079 | 0_2_00AD6079 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA2047 | 0_2_00AA2047 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AE21A6 | 0_2_00AE21A6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A601B5 | 0_2_00A601B5 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A261B4 | 0_2_00A261B4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AE180 | 0_2_009AE180 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD818F | 0_2_00AD818F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A50181 | 0_2_00A50181 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ADE197 | 0_2_00ADE197 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1E1EA | 0_2_00A1E1EA |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A81CC | 0_2_009A81CC |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ABC1FD | 0_2_00ABC1FD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009FC1FE | 0_2_009FC1FE |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ABA1C3 | 0_2_00ABA1C3 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A7E127 | 0_2_00A7E127 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A28132 | 0_2_00A28132 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A6C137 | 0_2_00A6C137 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A6E13C | 0_2_00A6E13C |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5811F | 0_2_00A5811F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5A165 | 0_2_00A5A165 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AC09E | 0_2_009AC09E |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0216A | 0_2_00A0216A |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2E142 | 0_2_00A2E142 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A6214B | 0_2_00A6214B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00998169 | 0_2_00998169 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00986160 | 0_2_00986160 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A322A7 | 0_2_00A322A7 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A782AD | 0_2_00A782AD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1A2B1 | 0_2_00A1A2B1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9C2BA | 0_2_00A9C2BA |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AAA2BF | 0_2_00AAA2BF |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ACE2BA | 0_2_00ACE2BA |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA028F | 0_2_00AA028F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009EA2AA | 0_2_009EA2AA |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A42D0 | 0_2_009A42D0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A202FC | 0_2_00A202FC |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5C227 | 0_2_00A5C227 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0E229 | 0_2_00A0E229 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ABE226 | 0_2_00ABE226 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9A234 | 0_2_00A9A234 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0099E220 | 0_2_0099E220 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1826F | 0_2_00A1826F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A14274 | 0_2_00A14274 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ACC272 | 0_2_00ACC272 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A4A242 | 0_2_00A4A242 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A3E244 | 0_2_00A3E244 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00984270 | 0_2_00984270 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8E244 | 0_2_00A8E244 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A46252 | 0_2_00A46252 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC625B | 0_2_00AC625B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A74258 | 0_2_00A74258 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A483A4 | 0_2_00A483A4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB83AB | 0_2_00AB83AB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5E3AB | 0_2_00A5E3AB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A703A9 | 0_2_00A703A9 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0C380 | 0_2_00A0C380 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AAC39F | 0_2_00AAC39F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB239E | 0_2_00AB239E |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ABC390 | 0_2_00ABC390 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A83D8 | 0_2_009A83D8 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009E83CF | 0_2_009E83CF |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8C3F4 | 0_2_00A8C3F4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A3A3FD | 0_2_00A3A3FD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A7C3C4 | 0_2_00A7C3C4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A3C3C4 | 0_2_00A3C3C4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009E43F3 | 0_2_009E43F3 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A563D4 | 0_2_00A563D4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC432E | 0_2_00AC432E |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A76321 | 0_2_00A76321 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A22334 | 0_2_00A22334 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA2308 | 0_2_00AA2308 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5230F | 0_2_00A5230F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00B3C31C | 0_2_00B3C31C |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A66314 | 0_2_00A66314 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD4319 | 0_2_00AD4319 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00B4637A | 0_2_00B4637A |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009E6372 | 0_2_009E6372 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009EE363 | 0_2_009EE363 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A86355 | 0_2_00A86355 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2C4A0 | 0_2_00A2C4A0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1C4A4 | 0_2_00A1C4A4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A344A9 | 0_2_00A344A9 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A20488 | 0_2_00A20488 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A6E4F6 | 0_2_00A6E4F6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2A4F5 | 0_2_00A2A4F5 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A04C6 | 0_2_009A04C6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A24E0 | 0_2_009A24E0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD642D | 0_2_00AD642D |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ADA40D | 0_2_00ADA40D |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ADC409 | 0_2_00ADC409 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9040F | 0_2_00A9040F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A38411 | 0_2_00A38411 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A98414 | 0_2_00A98414 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A06464 | 0_2_00A06464 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1A473 | 0_2_00A1A473 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A00475 | 0_2_00A00475 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009BA440 | 0_2_009BA440 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A3647C | 0_2_00A3647C |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AE2441 | 0_2_00AE2441 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB645B | 0_2_00AB645B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC2452 | 0_2_00AC2452 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5C5AE | 0_2_00A5C5AE |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB65BD | 0_2_00AB65BD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F85AC | 0_2_009F85AC |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A72592 | 0_2_00A72592 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1E5E2 | 0_2_00A1E5E2 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A765EE | 0_2_00A765EE |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009BA5D4 | 0_2_009BA5D4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A605F8 | 0_2_00A605F8 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A745F9 | 0_2_00A745F9 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A025C7 | 0_2_00A025C7 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009865F0 | 0_2_009865F0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A825C0 | 0_2_00A825C0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A465CD | 0_2_00A465CD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5E5CA | 0_2_00A5E5CA |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A945DB | 0_2_00A945DB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD45D7 | 0_2_00AD45D7 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A7052D | 0_2_00A7052D |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AAE537 | 0_2_00AAE537 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AC53C | 0_2_009AC53C |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009FC533 | 0_2_009FC533 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F4523 | 0_2_009F4523 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC4575 | 0_2_00AC4575 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ADE577 | 0_2_00ADE577 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A62578 | 0_2_00A62578 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0854A | 0_2_00A0854A |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A92544 | 0_2_00A92544 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A4560 | 0_2_009A4560 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1055B | 0_2_00A1055B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9A6A3 | 0_2_00A9A6A3 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A586A9 | 0_2_00A586A9 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A6E6B0 | 0_2_00A6E6B0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A166B6 | 0_2_00A166B6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A4C6B8 | 0_2_00A4C6B8 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD26B0 | 0_2_00AD26B0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A506BB | 0_2_00A506BB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD068E | 0_2_00AD068E |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB0681 | 0_2_00AB0681 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F26A2 | 0_2_009F26A2 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ADE6EF | 0_2_00ADE6EF |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A46D0 | 0_2_009A46D0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB26C8 | 0_2_00AB26C8 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A966C1 | 0_2_00A966C1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1C6CB | 0_2_00A1C6CB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009C06F0 | 0_2_009C06F0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8E6D8 | 0_2_00A8E6D8 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A046DB | 0_2_00A046DB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0E621 | 0_2_00A0E621 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2C62B | 0_2_00A2C62B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0099E630 | 0_2_0099E630 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC6606 | 0_2_00AC6606 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A78611 | 0_2_00A78611 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A12663 | 0_2_00A12663 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8A66C | 0_2_00A8A66C |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009B8650 | 0_2_009B8650 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A14676 | 0_2_00A14676 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A26648 | 0_2_00A26648 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A807B5 | 0_2_00A807B5 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A3A783 | 0_2_00A3A783 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A08782 | 0_2_00A08782 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0E79F | 0_2_00A0E79F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A1C7E4 | 0_2_00A1C7E4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA87F7 | 0_2_00AA87F7 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A447C4 | 0_2_00A447C4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A367C6 | 0_2_00A367C6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9E7C2 | 0_2_00A9E7C2 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ADC7C6 | 0_2_00ADC7C6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A3C7D1 | 0_2_00A3C7D1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA2728 | 0_2_00AA2728 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009FE705 | 0_2_009FE705 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9C736 | 0_2_00A9C736 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9870B | 0_2_00A9870B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC8704 | 0_2_00AC8704 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A4870E | 0_2_00A4870E |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A30710 | 0_2_00A30710 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A46767 | 0_2_00A46767 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00992750 | 0_2_00992750 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F0753 | 0_2_009F0753 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A64776 | 0_2_00A64776 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F674E | 0_2_009F674E |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F8749 | 0_2_009F8749 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0C744 | 0_2_00A0C744 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AAC74C | 0_2_00AAC74C |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A24750 | 0_2_00A24750 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8C752 | 0_2_00A8C752 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA6757 | 0_2_00AA6757 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A6A8AF | 0_2_00A6A8AF |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009B88B0 | 0_2_009B88B0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00B4E8D0 | 0_2_00B4E8D0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AAE8C1 | 0_2_00AAE8C1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A4C8C9 | 0_2_00A4C8C9 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ACA8C2 | 0_2_00ACA8C2 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA48C5 | 0_2_00AA48C5 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009FC8EB | 0_2_009FC8EB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A268DD | 0_2_00A268DD |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8A836 | 0_2_00A8A836 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC0832 | 0_2_00AC0832 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A0680A | 0_2_00A0680A |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A38808 | 0_2_00A38808 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AC4817 | 0_2_00AC4817 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AE2810 | 0_2_00AE2810 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A86879 | 0_2_00A86879 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0098C840 | 0_2_0098C840 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009E687A | 0_2_009E687A |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A609A4 | 0_2_00A609A4 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A3E9B6 | 0_2_00A3E9B6 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F4983 | 0_2_009F4983 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2E9BE | 0_2_00A2E9BE |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A52993 | 0_2_00A52993 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A00997 | 0_2_00A00997 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA2993 | 0_2_00AA2993 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AE09E9 | 0_2_00AE09E9 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AAA9E3 | 0_2_00AAA9E3 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD89FB | 0_2_00AD89FB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A9A9C8 | 0_2_00A9A9C8 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009AC9EB | 0_2_009AC9EB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A349DB | 0_2_00A349DB |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2C9D8 | 0_2_00A2C9D8 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A729DC | 0_2_00A729DC |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009C09E0 | 0_2_009C09E0 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00B369CC | 0_2_00B369CC |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AB692F | 0_2_00AB692F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009E4918 | 0_2_009E4918 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A6910 | 0_2_009A6910 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A2A938 | 0_2_00A2A938 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00ACC937 | 0_2_00ACC937 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A8490B | 0_2_00A8490B |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A5C914 | 0_2_00A5C914 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AD497F | 0_2_00AD497F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_0099E960 | 0_2_0099E960 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A56AB3 | 0_2_00A56AB3 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA2AB1 | 0_2_00AA2AB1 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009F6A80 | 0_2_009F6A80 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A20A81 | 0_2_00A20A81 |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_009A8ABC | 0_2_009A8ABC |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00A94A8F | 0_2_00A94A8F |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | Code function: 0_2_00AA0A8D | 0_2_00AA0A8D |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B427D3 second address: B427D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B427D7 second address: B427F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007FB3DD3D95E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB3DD3D95EEh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B427F3 second address: B42804 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBDh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B42804 second address: B42821 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB3DD3D95EDh 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007FB3DD3D95E6h 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B42821 second address: B42825 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B42825 second address: B4287E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD3D95F1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push edi 0x0000000e jmp 00007FB3DD3D95EEh 0x00000013 pushad 0x00000014 popad 0x00000015 pop edi 0x00000016 jmp 00007FB3DD3D95F0h 0x0000001b pushad 0x0000001c jmp 00007FB3DD3D95F9h 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4287E second address: B42884 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B54F57 second address: B54F5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B54F5E second address: B54F85 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FB3DD280BB6h 0x00000009 jmp 00007FB3DD280BBAh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007FB3DD280BBBh 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B54F85 second address: B54FA4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FB3DD3D95F3h 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FB3DD3D95E6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B55293 second address: B552B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBDh 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 jnp 00007FB3DD280BDAh 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B552B6 second address: B552BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57978 second address: B57987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57987 second address: B579BF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FB3DD3D95F2h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FB3DD3D95F9h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B579BF second address: B579D1 instructions: 0x00000000 rdtsc 0x00000002 js 00007FB3DD280BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b mov eax, dword ptr [eax] 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B579D1 second address: B579F3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FB3DD3D95F1h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B579F3 second address: B579F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B579F9 second address: B57A48 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d or dword ptr [ebp+122D2BC6h], ebx 0x00000013 lea ebx, dword ptr [ebp+1245280Ah] 0x00000019 xor cl, 00000031h 0x0000001c xchg eax, ebx 0x0000001d jnc 00007FB3DD3D9607h 0x00000023 push eax 0x00000024 pushad 0x00000025 pushad 0x00000026 jbe 00007FB3DD3D95E6h 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57AAE second address: B57B8C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FB3DD280BC0h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e jmp 00007FB3DD280BC9h 0x00000013 push 00000000h 0x00000015 mov edi, dword ptr [ebp+122D2A86h] 0x0000001b mov dword ptr [ebp+122D19A6h], edi 0x00000021 push 34E55E5Ch 0x00000026 ja 00007FB3DD280BCCh 0x0000002c jmp 00007FB3DD280BC6h 0x00000031 xor dword ptr [esp], 34E55EDCh 0x00000038 pushad 0x00000039 mov eax, dword ptr [ebp+122D28D6h] 0x0000003f push ecx 0x00000040 js 00007FB3DD280BB6h 0x00000046 pop esi 0x00000047 popad 0x00000048 push 00000003h 0x0000004a add dword ptr [ebp+122D2BCBh], edx 0x00000050 sub dword ptr [ebp+122D269Bh], edi 0x00000056 push 00000000h 0x00000058 jg 00007FB3DD280BBBh 0x0000005e movsx esi, ax 0x00000061 push 00000003h 0x00000063 pushad 0x00000064 mov edx, dword ptr [ebp+122D2A8Ah] 0x0000006a mov edi, 1830C1B3h 0x0000006f popad 0x00000070 push 4FA3003Bh 0x00000075 jmp 00007FB3DD280BC0h 0x0000007a add dword ptr [esp], 705CFFC5h 0x00000081 mov dword ptr [ebp+122D2720h], esi 0x00000087 lea ebx, dword ptr [ebp+12452813h] 0x0000008d mov edx, dword ptr [ebp+122D2AE2h] 0x00000093 push eax 0x00000094 push eax 0x00000095 push edx 0x00000096 push eax 0x00000097 push edx 0x00000098 jne 00007FB3DD280BB6h 0x0000009e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57B8C second address: B57B9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57C19 second address: B57C22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57C22 second address: B57CC8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 jo 00007FB3DD3D95EBh 0x0000000e mov ecx, 4168C65Eh 0x00000013 push 00000000h 0x00000015 pushad 0x00000016 call 00007FB3DD3D95ECh 0x0000001b jmp 00007FB3DD3D95EAh 0x00000020 pop ecx 0x00000021 sub edi, dword ptr [ebp+122D2A66h] 0x00000027 popad 0x00000028 push 95246880h 0x0000002d pushad 0x0000002e pushad 0x0000002f push eax 0x00000030 pop eax 0x00000031 jg 00007FB3DD3D95E6h 0x00000037 popad 0x00000038 jns 00007FB3DD3D95ECh 0x0000003e popad 0x0000003f add dword ptr [esp], 6ADB9800h 0x00000046 mov ecx, dword ptr [ebp+122D2846h] 0x0000004c push 00000003h 0x0000004e sbb si, 7CA7h 0x00000053 push 00000000h 0x00000055 mov dword ptr [ebp+122D580Dh], edx 0x0000005b push 00000003h 0x0000005d mov cx, dx 0x00000060 sub edx, dword ptr [ebp+122D286Eh] 0x00000066 call 00007FB3DD3D95E9h 0x0000006b jmp 00007FB3DD3D95F8h 0x00000070 push eax 0x00000071 pushad 0x00000072 push ebx 0x00000073 jns 00007FB3DD3D95E6h 0x00000079 pop ebx 0x0000007a push edx 0x0000007b push eax 0x0000007c push edx 0x0000007d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57CC8 second address: B57CEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jmp 00007FB3DD280BC4h 0x0000000f mov eax, dword ptr [eax] 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 pushad 0x00000015 popad 0x00000016 pop ebx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57CEE second address: B57CF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57CF4 second address: B57D0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jl 00007FB3DD280BB8h 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B57D0A second address: B57D1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD3D95F0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76318 second address: B7631C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B7631C second address: B76342 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FB3DD3D95F4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76900 second address: B7690A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB3DD280BB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76A88 second address: B76A9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FB3DD3D95E6h 0x00000009 jo 00007FB3DD3D95E6h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76A9B second address: B76AA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76C17 second address: B76C31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FB3DD3D95F0h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76C31 second address: B76C37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76C37 second address: B76C48 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EDh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76C48 second address: B76C4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76C4E second address: B76C66 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F2h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76C66 second address: B76C6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76DED second address: B76DF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76F48 second address: B76F5B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FB3DD280BBAh 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B76F5B second address: B76F8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD3D95F2h 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FB3DD3D95F5h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B77336 second address: B7734A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jne 00007FB3DD280BB6h 0x00000009 jl 00007FB3DD280BB6h 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B77C51 second address: B77C57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B77D93 second address: B77D9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B77D9A second address: B77DA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FB3DD3D95E6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B77DA6 second address: B77DAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B7DC30 second address: B7DC40 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B7DC40 second address: B7DC46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B7CD94 second address: B7CDA6 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnc 00007FB3DD3D95E6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B40D87 second address: B40D9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FB3DD280BB6h 0x0000000a pop ebx 0x0000000b js 00007FB3DD280BBEh 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B40D9C second address: B40DAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 jmp 00007FB3DD3D95EAh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4430D second address: B44314 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B44314 second address: B4431A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4431A second address: B4434E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 ja 00007FB3DD280BB8h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e jmp 00007FB3DD280BC5h 0x00000013 pushad 0x00000014 jno 00007FB3DD280BB6h 0x0000001a js 00007FB3DD280BB6h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B82CE0 second address: B82CEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jno 00007FB3DD3D95E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B82CEF second address: B82CF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B82CF7 second address: B82CFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B82F72 second address: B82F78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B82F78 second address: B82F84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB3DD3D95E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8322C second address: B83268 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD280BC7h 0x00000009 popad 0x0000000a pop eax 0x0000000b jp 00007FB3DD280BE6h 0x00000011 pushad 0x00000012 jmp 00007FB3DD280BBEh 0x00000017 push esi 0x00000018 pop esi 0x00000019 jng 00007FB3DD280BB6h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B83268 second address: B8327A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jns 00007FB3DD3D95E6h 0x0000000c push eax 0x0000000d pop eax 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B834F1 second address: B834FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FB3DD280BB6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B834FD second address: B83501 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B83501 second address: B83505 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B86277 second address: B8627B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B86B60 second address: B86B64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B86FB1 second address: B86FB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B86FB7 second address: B86FBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8708C second address: B87092 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B87159 second address: B8715D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B87620 second address: B8762A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push esi 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8762A second address: B87691 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop esi 0x00000006 xchg eax, ebx 0x00000007 push 00000000h 0x00000009 push edi 0x0000000a call 00007FB3DD280BB8h 0x0000000f pop edi 0x00000010 mov dword ptr [esp+04h], edi 0x00000014 add dword ptr [esp+04h], 00000018h 0x0000001c inc edi 0x0000001d push edi 0x0000001e ret 0x0000001f pop edi 0x00000020 ret 0x00000021 call 00007FB3DD280BC1h 0x00000026 sbb edi, 01D7E7C0h 0x0000002c pop esi 0x0000002d nop 0x0000002e pushad 0x0000002f jnl 00007FB3DD280BB8h 0x00000035 push esi 0x00000036 pop esi 0x00000037 jmp 00007FB3DD280BBCh 0x0000003c popad 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 push ebx 0x00000041 jmp 00007FB3DD280BBCh 0x00000046 pop ebx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B87691 second address: B8769B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FB3DD3D95E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B87764 second address: B87768 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B87768 second address: B8778B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FB3DD3D95F8h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B87B12 second address: B87B22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8800C second address: B88013 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B88831 second address: B88837 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B88837 second address: B8883D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B89A17 second address: B89A21 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB3DD280BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8918A second address: B8918E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8918E second address: B8919F instructions: 0x00000000 rdtsc 0x00000002 je 00007FB3DD280BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8A3FD second address: B8A460 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007FB3DD3D95E8h 0x00000010 popad 0x00000011 mov dword ptr [esp], eax 0x00000014 push 00000000h 0x00000016 push esi 0x00000017 call 00007FB3DD3D95E8h 0x0000001c pop esi 0x0000001d mov dword ptr [esp+04h], esi 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc esi 0x0000002a push esi 0x0000002b ret 0x0000002c pop esi 0x0000002d ret 0x0000002e mov esi, edx 0x00000030 push 00000000h 0x00000032 cld 0x00000033 push 00000000h 0x00000035 pushad 0x00000036 mov ebx, 75241CFBh 0x0000003b jo 00007FB3DD3D95ECh 0x00000041 mov dword ptr [ebp+122D384Dh], edi 0x00000047 popad 0x00000048 sbb si, B283h 0x0000004d push eax 0x0000004e pushad 0x0000004f push eax 0x00000050 push edx 0x00000051 jmp 00007FB3DD3D95ECh 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8919F second address: B891A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B891A6 second address: B891AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8D014 second address: B8D01A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8D01A second address: B8D090 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov edi, dword ptr [ebp+122D2B3Eh] 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ecx 0x00000014 call 00007FB3DD3D95E8h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], ecx 0x0000001e add dword ptr [esp+04h], 0000001Ah 0x00000026 inc ecx 0x00000027 push ecx 0x00000028 ret 0x00000029 pop ecx 0x0000002a ret 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push edi 0x00000030 call 00007FB3DD3D95E8h 0x00000035 pop edi 0x00000036 mov dword ptr [esp+04h], edi 0x0000003a add dword ptr [esp+04h], 00000018h 0x00000042 inc edi 0x00000043 push edi 0x00000044 ret 0x00000045 pop edi 0x00000046 ret 0x00000047 jmp 00007FB3DD3D95F2h 0x0000004c jnc 00007FB3DD3D95E8h 0x00000052 xchg eax, ebx 0x00000053 push eax 0x00000054 push edx 0x00000055 push edx 0x00000056 push edx 0x00000057 pop edx 0x00000058 pop edx 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8D090 second address: B8D09A instructions: 0x00000000 rdtsc 0x00000002 js 00007FB3DD280BBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8B8C7 second address: B8B8E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8C34C second address: B8C350 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8CE0E second address: B8CE26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD3D95F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8B8E2 second address: B8B8E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8B8E8 second address: B8B8F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9198D second address: B91991 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8B8F4 second address: B8B906 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8B906 second address: B8B90A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B92E4E second address: B92E52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B92140 second address: B92145 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B92E52 second address: B92E56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B92E56 second address: B92E5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B93FE9 second address: B94007 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FB3DD3D95ECh 0x0000000c jc 00007FB3DD3D95E6h 0x00000012 popad 0x00000013 push eax 0x00000014 jp 00007FB3DD3D960Ah 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B94007 second address: B9400B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B95024 second address: B9502D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9502D second address: B95031 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B95031 second address: B95035 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B95035 second address: B9504B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007FB3DD280BBCh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B942BA second address: B942C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B942C0 second address: B942E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007FB3DD280BB6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B942E5 second address: B94300 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B95275 second address: B95279 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B95279 second address: B9527F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9527F second address: B95289 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FB3DD280BBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B991CA second address: B991CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B991CE second address: B991E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9845B second address: B98465 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB3DD3D95ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9B72E second address: B9B735 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9C75A second address: B9C760 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9C760 second address: B9C764 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9C764 second address: B9C773 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9C773 second address: B9C777 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9C777 second address: B9C77D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9E892 second address: B9E896 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9E896 second address: B9E8A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jng 00007FB3DD3D95EEh 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BA1B64 second address: BA1B6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9B842 second address: B9B84C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FB3DD3D95E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9B84C second address: B9B850 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9FC2F second address: B9FC39 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BA33E4 second address: BA3487 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jnp 00007FB3DD280BB6h 0x0000000e popad 0x0000000f popad 0x00000010 nop 0x00000011 jmp 00007FB3DD280BBDh 0x00000016 mov edi, ecx 0x00000018 push dword ptr fs:[00000000h] 0x0000001f mov di, DCBDh 0x00000023 mov dword ptr fs:[00000000h], esp 0x0000002a jbe 00007FB3DD280BBCh 0x00000030 or dword ptr [ebp+122D2618h], edx 0x00000036 mov ebx, 28D28FA6h 0x0000003b mov eax, dword ptr [ebp+122D07E9h] 0x00000041 push 00000000h 0x00000043 push esi 0x00000044 call 00007FB3DD280BB8h 0x00000049 pop esi 0x0000004a mov dword ptr [esp+04h], esi 0x0000004e add dword ptr [esp+04h], 00000017h 0x00000056 inc esi 0x00000057 push esi 0x00000058 ret 0x00000059 pop esi 0x0000005a ret 0x0000005b sub dword ptr [ebp+122D3770h], ecx 0x00000061 push FFFFFFFFh 0x00000063 push 00000000h 0x00000065 push esi 0x00000066 call 00007FB3DD280BB8h 0x0000006b pop esi 0x0000006c mov dword ptr [esp+04h], esi 0x00000070 add dword ptr [esp+04h], 0000001Ch 0x00000078 inc esi 0x00000079 push esi 0x0000007a ret 0x0000007b pop esi 0x0000007c ret 0x0000007d push eax 0x0000007e jc 00007FB3DD280BC2h 0x00000084 jp 00007FB3DD280BBCh 0x0000008a push eax 0x0000008b push edx 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4C9BE second address: B4C9C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4C9C2 second address: B4C9DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD280BC4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4C9DF second address: B4CA0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FB3DD3D95E6h 0x0000000a pop edx 0x0000000b pushad 0x0000000c jmp 00007FB3DD3D95F8h 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAAB65 second address: BAAB91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FB3DD280BBCh 0x0000000a push edi 0x0000000b pop edi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jl 00007FB3DD280BCBh 0x00000015 jmp 00007FB3DD280BBBh 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B3BE58 second address: B3BE5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B3BE5E second address: B3BE63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B3BE63 second address: B3BE72 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jg 00007FB3DD3D95E6h 0x00000009 pop ebx 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAFDC3 second address: BAFDC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAFF51 second address: BAFF55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAFF55 second address: BAFF59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAFF59 second address: BAFF65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FB3DD3D95E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAFF65 second address: BAFF7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push edx 0x00000006 pop edx 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f js 00007FB3DD280BB6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAFF7C second address: BAFF85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BAFF85 second address: BAFF99 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BB5000 second address: BB5004 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BB5004 second address: BB5008 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BB5008 second address: BB500E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BB51A7 second address: BB521E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a push eax 0x0000000b jg 00007FB3DD280BC9h 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 jmp 00007FB3DD280BC4h 0x0000001a mov eax, dword ptr [eax] 0x0000001c pushad 0x0000001d push ebx 0x0000001e jmp 00007FB3DD280BC8h 0x00000023 pop ebx 0x00000024 push edi 0x00000025 pushad 0x00000026 popad 0x00000027 pop edi 0x00000028 popad 0x00000029 mov dword ptr [esp+04h], eax 0x0000002d js 00007FB3DD280BC0h 0x00000033 push eax 0x00000034 push edx 0x00000035 push edi 0x00000036 pop edi 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BB5301 second address: BB5306 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B49550 second address: B4955C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4955C second address: B49561 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBAA57 second address: BBAA6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBAA6C second address: BBAA84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jc 00007FB3DD3D95E6h 0x0000000c popad 0x0000000d pop esi 0x0000000e pushad 0x0000000f push ebx 0x00000010 ja 00007FB3DD3D95E6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBABA4 second address: BBABC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD280BC4h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBABC3 second address: BBABC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBABC7 second address: BBABCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBABCD second address: BBABD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBABD3 second address: BBABF0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC1h 0x00000007 jc 00007FB3DD280BBEh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBAD4B second address: BBAD51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBAD51 second address: BBAD7B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FB3DD280BB6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 jmp 00007FB3DD280BC7h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBAD7B second address: BBAD7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBB050 second address: BBB05A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBB05A second address: BBB073 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBB073 second address: BBB07F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BBB07F second address: BBB085 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC2991 second address: BC2997 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC2997 second address: BC299B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC19A7 second address: BC19B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FB3DD280BB6h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8F862 second address: B8F8AF instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FB3DD3D95E8h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 0000001Ah 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 xor dl, FFFFFF85h 0x00000029 lea eax, dword ptr [ebp+1248A4A9h] 0x0000002f xor di, CB50h 0x00000034 mov edx, dword ptr [ebp+122D35D2h] 0x0000003a nop 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f js 00007FB3DD3D95E6h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8F8AF second address: B8F8B5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8F8B5 second address: B8F8D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FB3DD3D95E6h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FB3DD3D95F0h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8F8D7 second address: B8F8DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8F8DB second address: B6BB8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007FB3DD3D95F8h 0x0000000c pop esi 0x0000000d popad 0x0000000e nop 0x0000000f sbb cl, 0000006Bh 0x00000012 call dword ptr [ebp+1244C9EDh] 0x00000018 pushad 0x00000019 push eax 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8F9CB second address: B8F9CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8F9CF second address: B8FA7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], ebx 0x0000000a mov cx, 8F8Fh 0x0000000e push dword ptr fs:[00000000h] 0x00000015 push 00000000h 0x00000017 push ebx 0x00000018 call 00007FB3DD3D95E8h 0x0000001d pop ebx 0x0000001e mov dword ptr [esp+04h], ebx 0x00000022 add dword ptr [esp+04h], 0000001Ah 0x0000002a inc ebx 0x0000002b push ebx 0x0000002c ret 0x0000002d pop ebx 0x0000002e ret 0x0000002f cmc 0x00000030 adc di, B9B6h 0x00000035 mov ecx, 14C991BFh 0x0000003a mov dword ptr fs:[00000000h], esp 0x00000041 movzx edx, bx 0x00000044 mov dword ptr [ebp+1248A501h], esp 0x0000004a mov dword ptr [ebp+122D222Eh], eax 0x00000050 cmp dword ptr [ebp+122D2B3Eh], 00000000h 0x00000057 jne 00007FB3DD3D96DCh 0x0000005d mov di, CFA1h 0x00000061 mov byte ptr [ebp+122D2BE8h], 00000047h 0x00000068 jmp 00007FB3DD3D95F7h 0x0000006d mov eax, D49AA7D2h 0x00000072 mov cx, AB5Ch 0x00000076 mov dh, A9h 0x00000078 nop 0x00000079 push eax 0x0000007a push edx 0x0000007b jbe 00007FB3DD3D95FAh 0x00000081 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8FA7E second address: B8FAAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB3DD280BC7h 0x00000008 jo 00007FB3DD280BB6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 ja 00007FB3DD280BD0h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8FD5B second address: B8FD60 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B8FF24 second address: B8FF54 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB3DD280BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 0C344069h 0x00000011 mov edi, 5FC83CEDh 0x00000016 push 7D0BE812h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FB3DD280BC3h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90089 second address: B9009A instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB3DD3D95E8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9009A second address: B900A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B903D3 second address: B903DD instructions: 0x00000000 rdtsc 0x00000002 js 00007FB3DD3D95ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B9084B second address: B90881 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB3DD280BBBh 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f xor dword ptr [ebp+122D25D8h], eax 0x00000015 push 0000001Eh 0x00000017 jmp 00007FB3DD280BC2h 0x0000001c nop 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 push edx 0x00000022 pop edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90881 second address: B90887 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90887 second address: B90898 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jc 00007FB3DD280BB6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90AF6 second address: B90AFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90AFC second address: B90B01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90B01 second address: B90B16 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB3DD3D95E8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90B16 second address: B90B1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90B1B second address: B90B50 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB3DD3D95F8h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90B50 second address: B90B5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FB3DD280BB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90B5A second address: B90B6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d push ebx 0x0000000e push edx 0x0000000f pop edx 0x00000010 pop ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90B6F second address: B90B73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90C52 second address: B90C5C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90C5C second address: B90C7A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FB3DD280BB6h 0x00000009 jmp 00007FB3DD280BBCh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90C7A second address: B90C7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90C7F second address: B90C85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B90C85 second address: B90D20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c lea eax, dword ptr [ebp+1248A4EDh] 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007FB3DD3D95E8h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 00000014h 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c mov ecx, dword ptr [ebp+124653CCh] 0x00000032 push eax 0x00000033 pushad 0x00000034 jmp 00007FB3DD3D95F8h 0x00000039 push esi 0x0000003a push eax 0x0000003b pop eax 0x0000003c pop esi 0x0000003d popad 0x0000003e mov dword ptr [esp], eax 0x00000041 sub dword ptr [ebp+1245A303h], edx 0x00000047 lea eax, dword ptr [ebp+1248A4A9h] 0x0000004d jl 00007FB3DD3D95ECh 0x00000053 mov edx, dword ptr [ebp+122D2AF2h] 0x00000059 nop 0x0000005a jmp 00007FB3DD3D95F2h 0x0000005f push eax 0x00000060 push ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 jl 00007FB3DD3D95E6h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B6C6D0 second address: B6C6D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC1EEE second address: BC1F03 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB3DD3D95EEh 0x00000008 push esi 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC99A8 second address: BC99BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD280BBBh 0x00000009 popad 0x0000000a push edi 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC99BC second address: BC99C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push edi 0x00000006 pop edi 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC99C8 second address: BC99CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC9B16 second address: BC9B1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BC9F24 second address: BC9F28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BCA34E second address: BCA354 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BCA354 second address: BCA358 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD2133 second address: BD2148 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F1h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4FF1D second address: B4FF23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD09D8 second address: BD09F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FB3DD3D95F4h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD0E26 second address: BD0E2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD0E2C second address: BD0E30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD0E30 second address: BD0E5F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jnc 00007FB3DD280BBEh 0x00000012 pushad 0x00000013 jne 00007FB3DD280BB6h 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c push esi 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1144 second address: BD1148 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1148 second address: BD114E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD114E second address: BD1158 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB3DD3D95ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD12AF second address: BD12B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD12B7 second address: BD12CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FB3DD3D95E6h 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007FB3DD3D95E6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD12CC second address: BD12D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1592 second address: BD159C instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD159C second address: BD15C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB3DD280BC9h 0x00000008 jc 00007FB3DD280BB6h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 pop eax 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD15C7 second address: BD15D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FB3DD3D95E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD15D1 second address: BD15D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD15D5 second address: BD15DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD15DB second address: BD15E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD15E7 second address: BD15ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD15ED second address: BD15F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD15F7 second address: BD1606 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1606 second address: BD160A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD177E second address: BD17A6 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007FB3DD3D95FBh 0x00000010 push edx 0x00000011 pop edx 0x00000012 jmp 00007FB3DD3D95F3h 0x00000017 push edi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1ABE second address: BD1AD2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC0h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1AD2 second address: BD1AFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB3DD3D95F5h 0x0000000d jmp 00007FB3DD3D95EDh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1AFC second address: BD1B13 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC1h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4FF12 second address: B4FF1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD1FD9 second address: BD1FE3 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FB3DD280BB6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD5FED second address: BD5FF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD5FF2 second address: BD5FFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD5B3F second address: BD5B4D instructions: 0x00000000 rdtsc 0x00000002 jg 00007FB3DD3D95E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD5B4D second address: BD5B51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD5B51 second address: BD5B57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD889E second address: BD88C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jno 00007FB3DD280BBAh 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FB3DD280BC3h 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD88C7 second address: BD88F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F7h 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ja 00007FB3DD3D95ECh 0x00000011 jno 00007FB3DD3D95E6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8A43 second address: BD8A47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8A47 second address: BD8A4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8A4D second address: BD8A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB3DD280BBDh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8A64 second address: BD8A68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8A68 second address: BD8A84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b jmp 00007FB3DD280BC0h 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8A84 second address: BD8A8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8BE7 second address: BD8BF1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB3DD280BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8BF1 second address: BD8C0D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FB3DD3D95EAh 0x0000000a pop edi 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e pushad 0x0000000f je 00007FB3DD3D95E6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8C0D second address: BD8C23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB3DD280BBDh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BD8C23 second address: BD8C27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BDD293 second address: BDD2AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE317E second address: BE318E instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB3DD3D95E6h 0x00000008 jl 00007FB3DD3D95E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE318E second address: BE319A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jo 00007FB3DD280BB6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE319A second address: BE31A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE31A4 second address: BE31AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE31AA second address: BE31AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B45E6D second address: B45E7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007FB3DD280BB6h 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B45E7D second address: B45EAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edi 0x00000008 pushad 0x00000009 pushad 0x0000000a jp 00007FB3DD3D95E6h 0x00000010 ja 00007FB3DD3D95E6h 0x00000016 jmp 00007FB3DD3D95F0h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jns 00007FB3DD3D95E6h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE1B29 second address: BE1B2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE1C8E second address: BE1C9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007FB3DD3D95E6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE1C9A second address: BE1C9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE1C9E second address: BE1CC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD3D95F7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007FB3DD3D95ECh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE1E43 second address: BE1E74 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB3DD280BBAh 0x00000010 push eax 0x00000011 jl 00007FB3DD280BB6h 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE1E74 second address: BE1E7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE1FD5 second address: BE1FDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE2401 second address: BE240C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE240C second address: BE2439 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD280BC5h 0x00000009 jmp 00007FB3DD280BC2h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE2584 second address: BE2588 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE2588 second address: BE259F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FB3DD280BB8h 0x0000000c push eax 0x0000000d pop eax 0x0000000e push ecx 0x0000000f jng 00007FB3DD280BB6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE2EE6 second address: BE2F02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push esi 0x00000006 jmp 00007FB3DD3D95F3h 0x0000000b push esi 0x0000000c pop esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE6294 second address: BE6299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE6299 second address: BE62DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jp 00007FB3DD3D95E8h 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FB3DD3D95F2h 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE62DB second address: BE62DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE62DF second address: BE62E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE6436 second address: BE6440 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE658D second address: BE6599 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jo 00007FB3DD3D95E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE66C2 second address: BE66CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE66CD second address: BE66D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE66D2 second address: BE66D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BE66D8 second address: BE66EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FB3DD3D95E6h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BEE3DE second address: BEE3E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BEE3E2 second address: BEE3E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BEC662 second address: BEC673 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnc 00007FB3DD280BB6h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BEC673 second address: BEC677 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BECF12 second address: BECF25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FB3DD280BB6h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d je 00007FB3DD280BB6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BECF25 second address: BECF29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BECF29 second address: BECF35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BECF35 second address: BECF3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BECF3A second address: BECF3F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED24E second address: BED252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED545 second address: BED54B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED54B second address: BED550 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED550 second address: BED571 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edi 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FB3DD280BC3h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED571 second address: BED58C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FB3DD3D95E6h 0x0000000a popad 0x0000000b js 00007FB3DD3D95F0h 0x00000011 jmp 00007FB3DD3D95EAh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED58C second address: BED592 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED8B2 second address: BED8B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED8B8 second address: BED8D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB3DD280BC4h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BED8D5 second address: BED8D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BEDB81 second address: BEDB8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FB3DD280BB6h 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF2F4C second address: BF2F54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF2F54 second address: BF2F61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FB3DD280BB6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF20BF second address: BF20C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF20C6 second address: BF20CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF20CB second address: BF20D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB3DD3D95E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF20D7 second address: BF20E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FB3DD280BB6h 0x0000000a popad 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF23B5 second address: BF23B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF23B9 second address: BF241D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FB3DD280BC6h 0x0000000c jmp 00007FB3DD280BC6h 0x00000011 popad 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 jmp 00007FB3DD280BBFh 0x0000001a jnl 00007FB3DD280BB6h 0x00000020 jmp 00007FB3DD280BC0h 0x00000025 pushad 0x00000026 popad 0x00000027 popad 0x00000028 pushad 0x00000029 pushad 0x0000002a popad 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BF2B47 second address: BF2B50 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFE45E second address: BFE462 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFE5CC second address: BFE5E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD3D95EDh 0x00000009 jno 00007FB3DD3D95E6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFE882 second address: BFE88B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFE88B second address: BFE89D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFECD5 second address: BFECFB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FB3DD280BBCh 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FB3DD280BC1h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFECFB second address: BFED12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD3D95F3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFF3AD second address: BFF3B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFF3B1 second address: BFF3CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB3DD3D95F4h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: BFF3CB second address: BFF3D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4798F second address: B47993 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B47993 second address: B4799D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B4799D second address: B479A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: B479A1 second address: B479B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jns 00007FB3DD280BB6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C078A8 second address: C078B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jno 00007FB3DD3D95E6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C078B4 second address: C078C0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C078C0 second address: C078C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C140A1 second address: C140AC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 js 00007FB3DD280BB6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C140AC second address: C140B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C194AC second address: C194C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C194C9 second address: C194CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C194CF second address: C194D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C194D7 second address: C194E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB3DD3D95E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C194E3 second address: C194E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C233D3 second address: C233D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C233D8 second address: C233E2 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB3DD280BBEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C2D015 second address: C2D019 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C2D019 second address: C2D021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C2CEC0 second address: C2CEC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C33947 second address: C33985 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jnl 00007FB3DD280BB6h 0x0000000c jnp 00007FB3DD280BB6h 0x00000012 jmp 00007FB3DD280BC0h 0x00000017 popad 0x00000018 push eax 0x00000019 push esi 0x0000001a pop esi 0x0000001b pop eax 0x0000001c popad 0x0000001d pushad 0x0000001e jmp 00007FB3DD280BBDh 0x00000023 push eax 0x00000024 push edx 0x00000025 jno 00007FB3DD280BB6h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C33985 second address: C33995 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007FB3DD3D95E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C33AD5 second address: C33AED instructions: 0x00000000 rdtsc 0x00000002 je 00007FB3DD280BBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c jl 00007FB3DD280BB6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C33C6D second address: C33C77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007FB3DD3D95E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C33DFA second address: C33E00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C33E00 second address: C33E06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C343E3 second address: C343ED instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB3DD280BB6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C388BB second address: C388C1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C38A25 second address: C38A29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C38A29 second address: C38A2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C38A2F second address: C38A40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jl 00007FB3DD280BB6h 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C40EE9 second address: C40EED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C55244 second address: C55254 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007FB3DD280BB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C55254 second address: C5525E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FB3DD3D95E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C5525E second address: C55271 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C55271 second address: C55279 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C54D84 second address: C54DB9 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB3DD280BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push esi 0x0000000c pop esi 0x0000000d jne 00007FB3DD280BB6h 0x00000013 pop eax 0x00000014 popad 0x00000015 pushad 0x00000016 push ecx 0x00000017 jmp 00007FB3DD280BC8h 0x0000001c push eax 0x0000001d pop eax 0x0000001e pop ecx 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C54DB9 second address: C54DC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FB3DD3D95E6h 0x0000000a popad 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C5830D second address: C58327 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC4h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C58178 second address: C581B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F3h 0x00000007 js 00007FB3DD3D95E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f je 00007FB3DD3D95F7h 0x00000015 push edx 0x00000016 pop edx 0x00000017 jmp 00007FB3DD3D95EFh 0x0000001c jng 00007FB3DD3D95EEh 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6BD04 second address: C6BD16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FB3DD280BBCh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6BD16 second address: C6BD1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6BD1C second address: C6BD20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6BE85 second address: C6BE98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007FB3DD3D95F2h 0x0000000b js 00007FB3DD3D95E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6BE98 second address: C6BEB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD280BC0h 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6BEB0 second address: C6BEB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6BEB4 second address: C6BEB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6C007 second address: C6C01F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD3D95F0h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6C01F second address: C6C02C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007FB3DD280BB6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6C02C second address: C6C045 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB3DD3D95EBh 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007FB3DD3D95E6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6C1A9 second address: C6C1AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6C1AF second address: C6C1B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6C1B3 second address: C6C1B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6C1B7 second address: C6C204 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB3DD3D95F5h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jns 00007FB3DD3D95F2h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FB3DD3D95F5h 0x0000001b jc 00007FB3DD3D95E6h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6EDB5 second address: C6EDBE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6EE5A second address: C6EE60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C6F394 second address: C6F398 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C7241A second address: C7243B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jne 00007FB3DD3D95E6h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FB3DD3D95EEh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C7243B second address: C7243F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C73EF8 second address: C73EFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: C73EFE second address: C73F08 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB3DD280BB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52D0406 second address: 52D0418 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD3D95EEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52D0418 second address: 52D044A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FB3DD280BC6h 0x00000011 mov ebp, esp 0x00000013 pushad 0x00000014 push esi 0x00000015 mov bl, ADh 0x00000017 pop eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52D044A second address: 52D0467 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov edx, dword ptr [ebp+0Ch] 0x00000009 pushad 0x0000000a pushad 0x0000000b mov dh, 25h 0x0000000d push ecx 0x0000000e pop edi 0x0000000f popad 0x00000010 movzx eax, bx 0x00000013 popad 0x00000014 mov ecx, dword ptr [ebp+08h] 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52D0467 second address: 52D046B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52D046B second address: 52D047F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0541 second address: 52F0545 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0545 second address: 52F054B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F054B second address: 52F05DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB3DD280BC1h 0x00000009 xor ecx, 4B9D4756h 0x0000000f jmp 00007FB3DD280BC1h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007FB3DD280BC3h 0x00000022 xor cx, 988Eh 0x00000027 jmp 00007FB3DD280BC9h 0x0000002c popfd 0x0000002d pushfd 0x0000002e jmp 00007FB3DD280BC0h 0x00000033 jmp 00007FB3DD280BC5h 0x00000038 popfd 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F05DA second address: 52F066A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007FB3DD3D95F7h 0x00000010 pushfd 0x00000011 jmp 00007FB3DD3D95F8h 0x00000016 add cx, 92F8h 0x0000001b jmp 00007FB3DD3D95EBh 0x00000020 popfd 0x00000021 popad 0x00000022 xchg eax, ebp 0x00000023 pushad 0x00000024 pushad 0x00000025 mov si, D341h 0x00000029 push eax 0x0000002a pop edx 0x0000002b popad 0x0000002c pushfd 0x0000002d jmp 00007FB3DD3D95EAh 0x00000032 or eax, 274BED58h 0x00000038 jmp 00007FB3DD3D95EBh 0x0000003d popfd 0x0000003e popad 0x0000003f mov ebp, esp 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 mov bx, DA46h 0x00000048 mov edx, 6A8454D2h 0x0000004d popad 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F066A second address: 52F0670 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0670 second address: 52F0674 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0674 second address: 52F06AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FB3DD280BC3h 0x00000012 jmp 00007FB3DD280BC3h 0x00000017 popfd 0x00000018 mov di, si 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F06AC second address: 52F06B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F06B2 second address: 52F06B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F06B6 second address: 52F06BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F06BA second address: 52F06E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FB3DD280BBAh 0x0000000e xchg eax, ecx 0x0000000f jmp 00007FB3DD280BC0h 0x00000014 xchg eax, esi 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F06E5 second address: 52F0702 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0702 second address: 52F071E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov edx, ecx 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F071E second address: 52F0753 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 pushfd 0x00000007 jmp 00007FB3DD3D95EDh 0x0000000c xor ax, 37D6h 0x00000011 jmp 00007FB3DD3D95F1h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, esi 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0753 second address: 52F0757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0757 second address: 52F076A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F076A second address: 52F0782 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD280BC4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0782 second address: 52F0786 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0786 second address: 52F07E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FB3DD280BC8h 0x00000014 jmp 00007FB3DD280BC5h 0x00000019 popfd 0x0000001a pushfd 0x0000001b jmp 00007FB3DD280BC0h 0x00000020 adc eax, 25914518h 0x00000026 jmp 00007FB3DD280BBBh 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F07E7 second address: 52F0839 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 423Ah 0x00000007 jmp 00007FB3DD3D95EBh 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f nop 0x00000010 jmp 00007FB3DD3D95F6h 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FB3DD3D95ECh 0x0000001f sbb ax, C9D8h 0x00000024 jmp 00007FB3DD3D95EBh 0x00000029 popfd 0x0000002a mov bx, si 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F08C4 second address: 52F08C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F08C8 second address: 52F08CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F08CE second address: 52F08DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD280BBDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0901 second address: 52F0905 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0905 second address: 52F090B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F090B second address: 52F0911 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0911 second address: 52F092B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB3DD280BBFh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F092B second address: 52E021B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB3DD3D95EFh 0x00000009 adc cx, BCDEh 0x0000000e jmp 00007FB3DD3D95F9h 0x00000013 popfd 0x00000014 mov bx, cx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a leave 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007FB3DD3D95F8h 0x00000022 sbb ch, 00000008h 0x00000025 jmp 00007FB3DD3D95EBh 0x0000002a popfd 0x0000002b jmp 00007FB3DD3D95F8h 0x00000030 popad 0x00000031 retn 0004h 0x00000034 nop 0x00000035 sub esp, 04h 0x00000038 xor ebx, ebx 0x0000003a cmp eax, 00000000h 0x0000003d je 00007FB3DD3D974Ah 0x00000043 mov dword ptr [esp], 0000000Dh 0x0000004a call 00007FB3E1D05991h 0x0000004f mov edi, edi 0x00000051 pushad 0x00000052 popad 0x00000053 xchg eax, ebp 0x00000054 push eax 0x00000055 push edx 0x00000056 push eax 0x00000057 push edx 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E021B second address: 52E021F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E021F second address: 52E0225 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0225 second address: 52E0236 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD280BBDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0236 second address: 52E023A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E023A second address: 52E0268 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FB3DD280BBAh 0x0000000f popad 0x00000010 xchg eax, ebp 0x00000011 jmp 00007FB3DD280BBCh 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b mov ch, dl 0x0000001d mov si, 1B35h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0268 second address: 52E026D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E026D second address: 52E02A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB3DD280BC7h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c sub esp, 2Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FB3DD280BC0h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E02A2 second address: 52E02B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E02B1 second address: 52E02B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E02B7 second address: 52E02C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E02C6 second address: 52E02CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E02CC second address: 52E0323 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, 0C1Dh 0x00000007 pushfd 0x00000008 jmp 00007FB3DD3D95EAh 0x0000000d sbb ah, 00000078h 0x00000010 jmp 00007FB3DD3D95EBh 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov dword ptr [esp], ebx 0x0000001c pushad 0x0000001d pushad 0x0000001e call 00007FB3DD3D95F2h 0x00000023 pop esi 0x00000024 push edx 0x00000025 pop ecx 0x00000026 popad 0x00000027 popad 0x00000028 xchg eax, edi 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FB3DD3D95F2h 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0323 second address: 52E0332 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0332 second address: 52E035E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB3DD3D95ECh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E03AD second address: 52E03B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E03B3 second address: 52E044C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub edi, edi 0x0000000b jmp 00007FB3DD3D95F1h 0x00000010 inc ebx 0x00000011 jmp 00007FB3DD3D95EEh 0x00000016 test al, al 0x00000018 jmp 00007FB3DD3D95F0h 0x0000001d je 00007FB3DD3D97D9h 0x00000023 pushad 0x00000024 mov di, ax 0x00000027 mov ch, A5h 0x00000029 popad 0x0000002a lea ecx, dword ptr [ebp-14h] 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007FB3DD3D95EBh 0x00000034 add cx, 523Eh 0x00000039 jmp 00007FB3DD3D95F9h 0x0000003e popfd 0x0000003f push eax 0x00000040 push edx 0x00000041 call 00007FB3DD3D95EEh 0x00000046 pop ecx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0496 second address: 52E049B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E049B second address: 52E04B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD3D95F2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E04E5 second address: 52E04E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E04E9 second address: 52E04EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E04EF second address: 52E04F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E04F5 second address: 52E0505 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0505 second address: 52E0509 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0509 second address: 52E050F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E050F second address: 52E057D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx esi, bx 0x00000006 call 00007FB3DD280BC9h 0x0000000b pop eax 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jg 00007FB44D38EB10h 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007FB3DD280BBDh 0x0000001c sbb ch, FFFFFFB6h 0x0000001f jmp 00007FB3DD280BC1h 0x00000024 popfd 0x00000025 mov edi, eax 0x00000027 popad 0x00000028 js 00007FB3DD280C49h 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007FB3DD280BC4h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E057D second address: 52E0581 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0581 second address: 52E0587 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0587 second address: 52E05C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB3DD3D95ECh 0x00000009 sbb cx, 0A38h 0x0000000e jmp 00007FB3DD3D95EBh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 cmp dword ptr [ebp-14h], edi 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov bl, cl 0x0000001f jmp 00007FB3DD3D95F3h 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E05C7 second address: 52E0609 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FB44D38EA6Dh 0x0000000f jmp 00007FB3DD280BBEh 0x00000014 mov ebx, dword ptr [ebp+08h] 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FB3DD280BBAh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0609 second address: 52E060F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E060F second address: 52E0650 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BBEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-2Ch] 0x0000000c pushad 0x0000000d push esi 0x0000000e mov dx, 56CCh 0x00000012 pop edx 0x00000013 popad 0x00000014 xchg eax, esi 0x00000015 jmp 00007FB3DD280BC0h 0x0000001a push eax 0x0000001b jmp 00007FB3DD280BBBh 0x00000020 xchg eax, esi 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0650 second address: 52E0654 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0654 second address: 52E065A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E065A second address: 52E06D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FB3DD3D95EEh 0x00000011 adc al, 00000078h 0x00000014 jmp 00007FB3DD3D95EBh 0x00000019 popfd 0x0000001a pushfd 0x0000001b jmp 00007FB3DD3D95F8h 0x00000020 jmp 00007FB3DD3D95F5h 0x00000025 popfd 0x00000026 popad 0x00000027 push eax 0x00000028 pushad 0x00000029 mov cx, dx 0x0000002c movsx edi, cx 0x0000002f popad 0x00000030 nop 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FB3DD3D95F1h 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E06D5 second address: 52E06DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0755 second address: 52E0759 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0759 second address: 52E0771 instructions: 0x00000000 rdtsc 0x00000002 mov bl, al 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 mov eax, 4BCDBC91h 0x0000000c pop eax 0x0000000d popad 0x0000000e test esi, esi 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov al, 0Ch 0x00000015 mov dh, FAh 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0771 second address: 52E0777 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0777 second address: 52E000E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FB44D38EA8Ch 0x0000000e xor eax, eax 0x00000010 jmp 00007FB3DD25A2EAh 0x00000015 pop esi 0x00000016 pop edi 0x00000017 pop ebx 0x00000018 leave 0x00000019 retn 0004h 0x0000001c nop 0x0000001d sub esp, 04h 0x00000020 mov esi, eax 0x00000022 xor ebx, ebx 0x00000024 cmp esi, 00000000h 0x00000027 je 00007FB3DD280CF5h 0x0000002d call 00007FB3E1BACBFCh 0x00000032 mov edi, edi 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007FB3DD280BBAh 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E000E second address: 52E0070 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FB3DD3D95F6h 0x0000000f push eax 0x00000010 pushad 0x00000011 pushad 0x00000012 jmp 00007FB3DD3D95F7h 0x00000017 mov ah, C4h 0x00000019 popad 0x0000001a jmp 00007FB3DD3D95F5h 0x0000001f popad 0x00000020 xchg eax, ebp 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 mov eax, edx 0x00000026 push ebx 0x00000027 pop esi 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0070 second address: 52E00AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop edi 0x00000005 jmp 00007FB3DD280BBAh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f jmp 00007FB3DD280BC0h 0x00000014 xchg eax, ecx 0x00000015 jmp 00007FB3DD280BC0h 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov di, ax 0x00000021 pushad 0x00000022 popad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E00AF second address: 52E0106 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB3DD3D95F5h 0x00000008 mov esi, 7B2EC577h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xchg eax, ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FB3DD3D95EFh 0x0000001a sbb ecx, 0EEDABFEh 0x00000020 jmp 00007FB3DD3D95F9h 0x00000025 popfd 0x00000026 mov edx, ecx 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0106 second address: 52E010C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E010C second address: 52E0169 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [ebp-04h], 55534552h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 call 00007FB3DD3D95EBh 0x0000001a pop esi 0x0000001b pushfd 0x0000001c jmp 00007FB3DD3D95F9h 0x00000021 and cx, 2A46h 0x00000026 jmp 00007FB3DD3D95F1h 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E01C0 second address: 52E01FD instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FB3DD280BBBh 0x00000008 jmp 00007FB3DD280BC3h 0x0000000d popfd 0x0000000e pop edx 0x0000000f pop eax 0x00000010 popad 0x00000011 leave 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB3DD280BC5h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E01FD second address: 52E0203 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0203 second address: 52E0207 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0B5E second address: 52E0B62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0B62 second address: 52E0B7F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0B7F second address: 52E0BC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FB3DD3D95EEh 0x0000000f push eax 0x00000010 jmp 00007FB3DD3D95EBh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FB3DD3D95F5h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0BC7 second address: 52E0BED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD280BC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB3DD280BBDh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0D82 second address: 52E0D9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52E0D9F second address: 52E0DA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F09C4 second address: 52F09CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F09CA second address: 52F09CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F09CE second address: 52F0A49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a jmp 00007FB3DD3D95EAh 0x0000000f pushfd 0x00000010 jmp 00007FB3DD3D95F2h 0x00000015 jmp 00007FB3DD3D95F5h 0x0000001a popfd 0x0000001b popad 0x0000001c mov dword ptr [esp], ebp 0x0000001f jmp 00007FB3DD3D95EEh 0x00000024 mov ebp, esp 0x00000026 jmp 00007FB3DD3D95F0h 0x0000002b xchg eax, esi 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007FB3DD3D95F7h 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0A49 second address: 52F0A80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 58h 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FB3DD280BBCh 0x0000000e xchg eax, esi 0x0000000f jmp 00007FB3DD280BC0h 0x00000014 mov esi, dword ptr [ebp+0Ch] 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FB3DD280BBAh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0A80 second address: 52F0A84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0A84 second address: 52F0A8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0A8A second address: 52F0A9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB3DD3D95EDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0A9B second address: 52F0AAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 pop edi 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0AAD second address: 52F0B1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB3DD3D95F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FB44D4C6EDBh 0x0000000f pushad 0x00000010 pushad 0x00000011 movzx esi, bx 0x00000014 jmp 00007FB3DD3D95EFh 0x00000019 popad 0x0000001a mov si, FB5Fh 0x0000001e popad 0x0000001f cmp dword ptr [7544459Ch], 05h 0x00000026 jmp 00007FB3DD3D95F2h 0x0000002b je 00007FB44D4DEF82h 0x00000031 jmp 00007FB3DD3D95F0h 0x00000036 xchg eax, esi 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a mov dl, 95h 0x0000003c mov ebx, eax 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0BBB second address: 52F0BBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0BBF second address: 52F0BC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4KDKJjRzm8.exe | RDTSC instruction interceptor: First address: 52F0C26 second address: 52F0C2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |