Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: k6olCJyvIj.exe, 00000000.00000002.2221627838.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221627838.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221627838.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013E3000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221776596.00000000013E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bashfulacid.lat:443/api |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013DD000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013E3000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221776596.00000000013E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://curverpluch.lat:443/api |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013E3000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221776596.00000000013E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://manyrestro.lat:443/api. |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013DD000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221627838.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013FB000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221776596.00000000013FB000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221627838.00000000013D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: k6olCJyvIj.exe, 00000000.00000002.2221627838.00000000013D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900? |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013E3000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221776596.00000000013E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900O |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221944110.0000000001431000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219916579.0000000001424000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219916579.0000000001431000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2220116562.0000000001424000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.0000000001424000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2220116562.0000000001424000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221627838.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013E3000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000002.2221776596.00000000013E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tentabatte.lat:443/api |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: k6olCJyvIj.exe, 00000000.00000003.2219916579.00000000013DD000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001462000.00000004.00000020.00020000.00000000.sdmp, k6olCJyvIj.exe, 00000000.00000003.2219873992.0000000001468000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: k6olCJyvIj.exe, 00000000.00000002.2221876956.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00078600 | 0_2_00078600 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0007B100 | 0_2_0007B100 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00126017 | 0_2_00126017 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015001A | 0_2_0015001A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00148008 | 0_2_00148008 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F6012 | 0_2_000F6012 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00186005 | 0_2_00186005 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00208002 | 0_2_00208002 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BC036 | 0_2_001BC036 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00210017 | 0_2_00210017 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D803A | 0_2_000D803A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018C05A | 0_2_0018C05A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F2059 | 0_2_000F2059 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B4046 | 0_2_001B4046 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015A071 | 0_2_0015A071 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C007A | 0_2_001C007A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F6079 | 0_2_001F6079 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000FC079 | 0_2_000FC079 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020C0A3 | 0_2_0020C0A3 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00198094 | 0_2_00198094 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011A080 | 0_2_0011A080 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009C09E | 0_2_0009C09E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D4085 | 0_2_001D4085 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F8093 | 0_2_000F8093 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000DE0AA | 0_2_000DE0AA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CE0B4 | 0_2_001CE0B4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001040BC | 0_2_001040BC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009A0CA | 0_2_0009A0CA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001680DB | 0_2_001680DB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_002380F7 | 0_2_002380F7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000860E9 | 0_2_000860E9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009C0E6 | 0_2_0009C0E6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D20FD | 0_2_000D20FD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001820EE | 0_2_001820EE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011E0EF | 0_2_0011E0EF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0019E119 | 0_2_0019E119 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EA118 | 0_2_001EA118 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010A119 | 0_2_0010A119 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DE10B | 0_2_001DE10B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020E13C | 0_2_0020E13C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E013E | 0_2_001E013E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013A122 | 0_2_0013A122 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016A151 | 0_2_0016A151 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B0151 | 0_2_001B0151 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00192156 | 0_2_00192156 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D0148 | 0_2_001D0148 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009C09E | 0_2_0009C09E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013614A | 0_2_0013614A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00088169 | 0_2_00088169 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00076160 | 0_2_00076160 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010017F | 0_2_0010017F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E817C | 0_2_000E817C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00132165 | 0_2_00132165 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018819B | 0_2_0018819B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009E180 | 0_2_0009E180 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B8196 | 0_2_001B8196 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014E184 | 0_2_0014E184 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CC18E | 0_2_001CC18E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E2195 | 0_2_000E2195 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013C18F | 0_2_0013C18F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001181A6 | 0_2_001181A6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F41A6 | 0_2_001F41A6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001281A8 | 0_2_001281A8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000981CC | 0_2_000981CC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FA1FD | 0_2_001FA1FD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_002021C2 | 0_2_002021C2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CA1F9 | 0_2_001CA1F9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00154210 | 0_2_00154210 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0008E220 | 0_2_0008E220 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014223A | 0_2_0014223A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EE25A | 0_2_001EE25A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015C253 | 0_2_0015C253 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00112240 | 0_2_00112240 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010E248 | 0_2_0010E248 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C8244 | 0_2_001C8244 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00190278 | 0_2_00190278 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00074270 | 0_2_00074270 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C42BC | 0_2_001C42BC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001842B0 | 0_2_001842B0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001102AA | 0_2_001102AA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FE2D2 | 0_2_001FE2D2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F22CF | 0_2_001F22CF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D42DF | 0_2_000D42DF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000942D0 | 0_2_000942D0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000FE2FA | 0_2_000FE2FA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012E2E4 | 0_2_0012E2E4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001AC2E6 | 0_2_001AC2E6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012A2EC | 0_2_0012A2EC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00180319 | 0_2_00180319 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DA316 | 0_2_001DA316 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00102302 | 0_2_00102302 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020A362 | 0_2_0020A362 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00120351 | 0_2_00120351 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00186357 | 0_2_00186357 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015A375 | 0_2_0015A375 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000DC369 | 0_2_000DC369 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018237D | 0_2_0018237D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00104376 | 0_2_00104376 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D637B | 0_2_001D637B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0022C34B | 0_2_0022C34B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011437C | 0_2_0011437C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00200354 | 0_2_00200354 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014A36F | 0_2_0014A36F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F6388 | 0_2_000F6388 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018C38B | 0_2_0018C38B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018E385 | 0_2_0018E385 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E63BF | 0_2_001E63BF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017E3A5 | 0_2_0017E3A5 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001583AD | 0_2_001583AD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000983D8 | 0_2_000983D8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012C3CC | 0_2_0012C3CC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001703F0 | 0_2_001703F0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A43EF | 0_2_001A43EF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BC3E3 | 0_2_001BC3E3 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0019441B | 0_2_0019441B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00124401 | 0_2_00124401 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F8435 | 0_2_001F8435 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016E420 | 0_2_0016E420 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0019C427 | 0_2_0019C427 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000AA440 | 0_2_000AA440 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001AA454 | 0_2_001AA454 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014C444 | 0_2_0014C444 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00116446 | 0_2_00116446 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000B0460 | 0_2_000B0460 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BA477 | 0_2_001BA477 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D2498 | 0_2_000D2498 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EA4BA | 0_2_001EA4BA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001364D1 | 0_2_001364D1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E24D3 | 0_2_001E24D3 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000904C6 | 0_2_000904C6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D64DC | 0_2_000D64DC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F84DD | 0_2_000F84DD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016A4C4 | 0_2_0016A4C4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001304C9 | 0_2_001304C9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013C4CC | 0_2_0013C4CC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000924E0 | 0_2_000924E0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001884F1 | 0_2_001884F1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001224E2 | 0_2_001224E2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010A4E2 | 0_2_0010A4E2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EE4E9 | 0_2_001EE4E9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001604EC | 0_2_001604EC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020C4DE | 0_2_0020C4DE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E251B | 0_2_000E251B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014E503 | 0_2_0014E503 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009C53C | 0_2_0009C53C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CA52A | 0_2_001CA52A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00208565 | 0_2_00208565 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00196541 | 0_2_00196541 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00094560 | 0_2_00094560 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DC577 | 0_2_001DC577 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014257F | 0_2_0014257F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D056C | 0_2_001D056C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013256D | 0_2_0013256D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00172595 | 0_2_00172595 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00198591 | 0_2_00198591 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B4587 | 0_2_001B4587 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00192587 | 0_2_00192587 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F2580 | 0_2_001F2580 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000FE5AE | 0_2_000FE5AE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C85BA | 0_2_001C85BA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000AC5A0 | 0_2_000AC5A0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A05AE | 0_2_001A05AE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000DA5BB | 0_2_000DA5BB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001745AA | 0_2_001745AA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CC5DA | 0_2_001CC5DA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F05D8 | 0_2_001F05D8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E05DB | 0_2_000E05DB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A85CC | 0_2_001A85CC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000AA5D4 | 0_2_000AA5D4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DA5FA | 0_2_001DA5FA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000765F0 | 0_2_000765F0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DE5E1 | 0_2_001DE5E1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C461C | 0_2_001C461C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B261D | 0_2_001B261D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012861F | 0_2_0012861F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010E60A | 0_2_0010E60A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00160635 | 0_2_00160635 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016863C | 0_2_0016863C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010663C | 0_2_0010663C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012063D | 0_2_0012063D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D662C | 0_2_001D662C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0008E630 | 0_2_0008E630 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D464F | 0_2_000D464F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000A8650 | 0_2_000A8650 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000EC655 | 0_2_000EC655 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001AE641 | 0_2_001AE641 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012E676 | 0_2_0012E676 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D6668 | 0_2_000D6668 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0007E687 | 0_2_0007E687 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B669F | 0_2_001B669F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B868B | 0_2_001B868B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B0680 | 0_2_001B0680 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016468A | 0_2_0016468A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00202683 | 0_2_00202683 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0019E6B6 | 0_2_0019E6B6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001AC6A9 | 0_2_001AC6A9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001806AC | 0_2_001806AC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015C6D4 | 0_2_0015C6D4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001526D7 | 0_2_001526D7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001106D9 | 0_2_001106D9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000946D0 | 0_2_000946D0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001866C5 | 0_2_001866C5 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001186CF | 0_2_001186CF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DC6F1 | 0_2_001DC6F1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BE6EA | 0_2_001BE6EA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001566E1 | 0_2_001566E1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000B06F0 | 0_2_000B06F0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000FC6F0 | 0_2_000FC6F0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00144701 | 0_2_00144701 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013C731 | 0_2_0013C731 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018C73C | 0_2_0018C73C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D875C | 0_2_001D875C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C674C | 0_2_001C674C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00082750 | 0_2_00082750 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00154777 | 0_2_00154777 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017677A | 0_2_0017677A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013077D | 0_2_0013077D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FE76D | 0_2_001FE76D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00114769 | 0_2_00114769 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011C790 | 0_2_0011C790 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D278C | 0_2_001D278C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017A7BF | 0_2_0017A7BF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A27B0 | 0_2_001A27B0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001787A4 | 0_2_001787A4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012A7A5 | 0_2_0012A7A5 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001167C3 | 0_2_001167C3 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D47CE | 0_2_001D47CE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000FA7D5 | 0_2_000FA7D5 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E67EF | 0_2_000E67EF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015E7FE | 0_2_0015E7FE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001847F6 | 0_2_001847F6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C27EB | 0_2_001C27EB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017C7ED | 0_2_0017C7ED |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EC819 | 0_2_001EC819 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010481A | 0_2_0010481A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00136800 | 0_2_00136800 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F6816 | 0_2_000F6816 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014A80A | 0_2_0014A80A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020083F | 0_2_0020083F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00102838 | 0_2_00102838 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017283D | 0_2_0017283D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00122821 | 0_2_00122821 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00182820 | 0_2_00182820 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011E82A | 0_2_0011E82A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0007C840 | 0_2_0007C840 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013A859 | 0_2_0013A859 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BC851 | 0_2_001BC851 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00132847 | 0_2_00132847 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0023687E | 0_2_0023687E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001AA844 | 0_2_001AA844 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016E865 | 0_2_0016E865 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018E863 | 0_2_0018E863 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E289B | 0_2_001E289B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010889E | 0_2_0010889E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BA88F | 0_2_001BA88F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014C88B | 0_2_0014C88B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000EA8AD | 0_2_000EA8AD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0008C8A0 | 0_2_0008C8A0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001488BC | 0_2_001488BC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001908B6 | 0_2_001908B6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016A8A5 | 0_2_0016A8A5 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000A88B0 | 0_2_000A88B0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001948D2 | 0_2_001948D2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_002048F7 | 0_2_002048F7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001928FB | 0_2_001928FB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EE8EC | 0_2_001EE8EC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CA8E8 | 0_2_001CA8E8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E48F1 | 0_2_000E48F1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F491D | 0_2_001F491D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F2906 | 0_2_000F2906 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020A933 | 0_2_0020A933 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00096910 | 0_2_00096910 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DA93D | 0_2_001DA93D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0019A931 | 0_2_0019A931 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000DC93F | 0_2_000DC93F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A0922 | 0_2_001A0922 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F0936 | 0_2_000F0936 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012892B | 0_2_0012892B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C0942 | 0_2_001C0942 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F2979 | 0_2_001F2979 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E0969 | 0_2_000E0969 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0008E960 | 0_2_0008E960 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F4985 | 0_2_000F4985 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00116986 | 0_2_00116986 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F6990 | 0_2_000F6990 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017A9B5 | 0_2_0017A9B5 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B29BF | 0_2_001B29BF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018C9BF | 0_2_0018C9BF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012C9A3 | 0_2_0012C9A3 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001969DC | 0_2_001969DC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FC9DA | 0_2_001FC9DA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009C9EB | 0_2_0009C9EB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000B09E0 | 0_2_000B09E0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_002269CC | 0_2_002269CC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001989EA | 0_2_001989EA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DE9E8 | 0_2_001DE9E8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00202A22 | 0_2_00202A22 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00110A12 | 0_2_00110A12 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014EA11 | 0_2_0014EA11 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E6A18 | 0_2_001E6A18 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B6A0F | 0_2_001B6A0F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00100A0B | 0_2_00100A0B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016CA24 | 0_2_0016CA24 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CCA5A | 0_2_001CCA5A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000ACA40 | 0_2_000ACA40 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014CA49 | 0_2_0014CA49 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00184A79 | 0_2_00184A79 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B4A7D | 0_2_001B4A7D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00106A78 | 0_2_00106A78 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A0A9E | 0_2_001A0A9E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F8A95 | 0_2_000F8A95 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001ACA80 | 0_2_001ACA80 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010EAB2 | 0_2_0010EAB2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00118ABB | 0_2_00118ABB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C0AA8 | 0_2_001C0AA8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00098ABC | 0_2_00098ABC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E8ADF | 0_2_001E8ADF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D4ACB | 0_2_000D4ACB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00164AC4 | 0_2_00164AC4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E0AD1 | 0_2_000E0AD1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00102AE4 | 0_2_00102AE4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DCB1F | 0_2_001DCB1F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00088B1B | 0_2_00088B1B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00158B39 | 0_2_00158B39 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00234B0E | 0_2_00234B0E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017EB28 | 0_2_0017EB28 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D8B5E | 0_2_001D8B5E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00210B62 | 0_2_00210B62 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0007AB40 | 0_2_0007AB40 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013EB5C | 0_2_0013EB5C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B2B7A | 0_2_001B2B7A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00140B7E | 0_2_00140B7E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BEB69 | 0_2_001BEB69 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00196B6C | 0_2_00196B6C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00162B60 | 0_2_00162B60 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00166B61 | 0_2_00166B61 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00188B6F | 0_2_00188B6F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00112B6D | 0_2_00112B6D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0008EB80 | 0_2_0008EB80 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00074BA0 | 0_2_00074BA0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D4BAE | 0_2_001D4BAE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F2BB7 | 0_2_000F2BB7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C6BA0 | 0_2_001C6BA0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015ABAA | 0_2_0015ABAA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B0BD6 | 0_2_001B0BD6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00172BD9 | 0_2_00172BD9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015CBC2 | 0_2_0015CBC2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00136BF4 | 0_2_00136BF4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00200BC9 | 0_2_00200BC9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00148BFE | 0_2_00148BFE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D2BEC | 0_2_001D2BEC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E8C00 | 0_2_000E8C00 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00154C36 | 0_2_00154C36 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00184C32 | 0_2_00184C32 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E4C24 | 0_2_001E4C24 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00176C2C | 0_2_00176C2C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001AAC5B | 0_2_001AAC5B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00132C56 | 0_2_00132C56 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00180C4D | 0_2_00180C4D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011EC46 | 0_2_0011EC46 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F2C79 | 0_2_001F2C79 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00104C7D | 0_2_00104C7D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017AC6E | 0_2_0017AC6E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D0C99 | 0_2_001D0C99 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00118C80 | 0_2_00118C80 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00152C84 | 0_2_00152C84 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0013AC8A | 0_2_0013AC8A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00084CA0 | 0_2_00084CA0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A8CB4 | 0_2_001A8CB4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00188CAD | 0_2_00188CAD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D6CB7 | 0_2_000D6CB7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E8CA1 | 0_2_001E8CA1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00140CD7 | 0_2_00140CD7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000FCCC6 | 0_2_000FCCC6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00146CC6 | 0_2_00146CC6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00192CCF | 0_2_00192CCF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FACC0 | 0_2_001FACC0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CACF9 | 0_2_001CACF9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00170CE4 | 0_2_00170CE4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012ACE9 | 0_2_0012ACE9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D4D19 | 0_2_001D4D19 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00142D0C | 0_2_00142D0C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00130D33 | 0_2_00130D33 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00126D30 | 0_2_00126D30 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00096D2E | 0_2_00096D2E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000B0D20 | 0_2_000B0D20 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00116D52 | 0_2_00116D52 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009CD4C | 0_2_0009CD4C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A6D5D | 0_2_001A6D5D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D6D57 | 0_2_001D6D57 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EED4D | 0_2_001EED4D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C0D4A | 0_2_001C0D4A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00190D4E | 0_2_00190D4E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009CD5E | 0_2_0009CD5E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016AD4E | 0_2_0016AD4E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DAD79 | 0_2_001DAD79 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010AD7C | 0_2_0010AD7C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000EED78 | 0_2_000EED78 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00156D63 | 0_2_00156D63 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001DED9C | 0_2_001DED9C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000EAD82 | 0_2_000EAD82 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001EAD88 | 0_2_001EAD88 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00158DBC | 0_2_00158DBC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F4DAB | 0_2_001F4DAB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00196DAE | 0_2_00196DAE |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0014EDDD | 0_2_0014EDDD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000ECDDB | 0_2_000ECDDB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00114DCD | 0_2_00114DCD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00166DF2 | 0_2_00166DF2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000ACDF0 | 0_2_000ACDF0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00102DEC | 0_2_00102DEC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FCE12 | 0_2_001FCE12 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0019EE16 | 0_2_0019EE16 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00100E06 | 0_2_00100E06 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00198E3C | 0_2_00198E3C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016CE3D | 0_2_0016CE3D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D4E3E | 0_2_000D4E3E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F6E36 | 0_2_000F6E36 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0007CE45 | 0_2_0007CE45 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00144E52 | 0_2_00144E52 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F8E44 | 0_2_000F8E44 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000DCE55 | 0_2_000DCE55 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00092E6D | 0_2_00092E6D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00090E6C | 0_2_00090E6C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0009EE63 | 0_2_0009EE63 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010EE7A | 0_2_0010EE7A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00184E64 | 0_2_00184E64 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020CEA1 | 0_2_0020CEA1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CCE9B | 0_2_001CCE9B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D2E8C | 0_2_001D2E8C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012EE81 | 0_2_0012EE81 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A0E8F | 0_2_001A0E8F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018CE8E | 0_2_0018CE8E |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00128E8C | 0_2_00128E8C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F4EAA | 0_2_000F4EAA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C0EBA | 0_2_001C0EBA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000A8EA0 | 0_2_000A8EA0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011EEBF | 0_2_0011EEBF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00072EB0 | 0_2_00072EB0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0008AEB0 | 0_2_0008AEB0 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E2EA2 | 0_2_001E2EA2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017EED1 | 0_2_0017EED1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000C8ECB | 0_2_000C8ECB |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0010CEC2 | 0_2_0010CEC2 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015CECC | 0_2_0015CECC |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00232EC7 | 0_2_00232EC7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0018AEF1 | 0_2_0018AEF1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0019CEE6 | 0_2_0019CEE6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00154F00 | 0_2_00154F00 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011AF31 | 0_2_0011AF31 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BCF38 | 0_2_001BCF38 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00172F25 | 0_2_00172F25 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B2F5D | 0_2_001B2F5D |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00196F51 | 0_2_00196F51 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00202F73 | 0_2_00202F73 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00086F52 | 0_2_00086F52 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001CEF43 | 0_2_001CEF43 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00120F7A | 0_2_00120F7A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B4F67 | 0_2_001B4F67 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F0F9A | 0_2_001F0F9A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00162F9B | 0_2_00162F9B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00206FAD | 0_2_00206FAD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00100FB4 | 0_2_00100FB4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0016AFA7 | 0_2_0016AFA7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017CFA9 | 0_2_0017CFA9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0017AFD7 | 0_2_0017AFD7 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00140FD6 | 0_2_00140FD6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E6FC9 | 0_2_000E6FC9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FCFD8 | 0_2_001FCFD8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E4FD6 | 0_2_001E4FD6 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00144FC9 | 0_2_00144FC9 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001C8FFD | 0_2_001C8FFD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000DEFE4 | 0_2_000DEFE4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F6FF4 | 0_2_001F6FF4 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001D101C | 0_2_001D101C |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B7018 | 0_2_001B7018 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0008D003 | 0_2_0008D003 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A3001 | 0_2_001A3001 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00153035 | 0_2_00153035 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FF03B | 0_2_001FF03B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0007D021 | 0_2_0007D021 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001BF02F | 0_2_001BF02F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00177059 | 0_2_00177059 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011304A | 0_2_0011304A |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001F9042 | 0_2_001F9042 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001E1040 | 0_2_001E1040 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0015B073 | 0_2_0015B073 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000F7067 | 0_2_000F7067 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001FB068 | 0_2_001FB068 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0011706F | 0_2_0011706F |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000E308B | 0_2_000E308B |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_00125095 | 0_2_00125095 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001B30B8 | 0_2_001B30B8 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0020F086 | 0_2_0020F086 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_000D70A5 | 0_2_000D70A5 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A50AA | 0_2_001A50AA |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001AF0AF | 0_2_001AF0AF |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_0012D0D3 | 0_2_0012D0D3 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001570D1 | 0_2_001570D1 |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | Code function: 0_2_001A90CD | 0_2_001A90CD |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: C955A second address: C955E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: C955E second address: C9574 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E3Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: C9574 second address: C8E12 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a cld 0x0000000b push dword ptr [ebp+122D13E9h] 0x00000011 mov dword ptr [ebp+122D1DA8h], ecx 0x00000017 call dword ptr [ebp+122D2A9Bh] 0x0000001d pushad 0x0000001e pushad 0x0000001f mov edi, dword ptr [ebp+122D2F17h] 0x00000025 add dword ptr [ebp+122D1DA8h], ebx 0x0000002b popad 0x0000002c xor eax, eax 0x0000002e mov dword ptr [ebp+122D292Fh], ebx 0x00000034 mov edx, dword ptr [esp+28h] 0x00000038 pushad 0x00000039 or edx, 529C6C87h 0x0000003f xor ecx, 18EC80D5h 0x00000045 popad 0x00000046 mov dword ptr [ebp+122D2DA7h], eax 0x0000004c mov dword ptr [ebp+122D2ACCh], esi 0x00000052 mov esi, 0000003Ch 0x00000057 cld 0x00000058 add esi, dword ptr [esp+24h] 0x0000005c jmp 00007F22F0D0471Ch 0x00000061 lodsw 0x00000063 cmc 0x00000064 add eax, dword ptr [esp+24h] 0x00000068 jmp 00007F22F0D0471Ch 0x0000006d mov ebx, dword ptr [esp+24h] 0x00000071 pushad 0x00000072 mov dl, 46h 0x00000074 mov dword ptr [ebp+122D1D53h], edx 0x0000007a popad 0x0000007b nop 0x0000007c pushad 0x0000007d push eax 0x0000007e push edx 0x0000007f pushad 0x00000080 popad 0x00000081 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 243CEB second address: 243D0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F22F0D06E36h 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F22F0D06E40h 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 243D0D second address: 243D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 22F34E second address: 22F352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242C76 second address: 242C81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242C81 second address: 242C9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E40h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push esi 0x0000000d pop esi 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242C9E second address: 242CA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242CA6 second address: 242CAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242CAF second address: 242CB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242CB5 second address: 242CB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242CB9 second address: 242CD4 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F22F0D04716h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F22F0D0471Bh 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242E20 second address: 242E25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 242E25 second address: 242E2F instructions: 0x00000000 rdtsc 0x00000002 jg 00007F22F0D0471Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 243456 second address: 24345E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 24345E second address: 243468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2463FA second address: C8E12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E48h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F22F0D06E3Ah 0x0000000e popad 0x0000000f add dword ptr [esp], 1AFB156Ah 0x00000016 mov dword ptr [ebp+122D1C74h], edi 0x0000001c push dword ptr [ebp+122D13E9h] 0x00000022 adc esi, 13346741h 0x00000028 call dword ptr [ebp+122D2A9Bh] 0x0000002e pushad 0x0000002f pushad 0x00000030 mov edi, dword ptr [ebp+122D2F17h] 0x00000036 add dword ptr [ebp+122D1DA8h], ebx 0x0000003c popad 0x0000003d xor eax, eax 0x0000003f mov dword ptr [ebp+122D292Fh], ebx 0x00000045 mov edx, dword ptr [esp+28h] 0x00000049 pushad 0x0000004a or edx, 529C6C87h 0x00000050 xor ecx, 18EC80D5h 0x00000056 popad 0x00000057 mov dword ptr [ebp+122D2DA7h], eax 0x0000005d mov dword ptr [ebp+122D2ACCh], esi 0x00000063 mov esi, 0000003Ch 0x00000068 cld 0x00000069 add esi, dword ptr [esp+24h] 0x0000006d jmp 00007F22F0D06E3Ch 0x00000072 lodsw 0x00000074 cmc 0x00000075 add eax, dword ptr [esp+24h] 0x00000079 jmp 00007F22F0D06E3Ch 0x0000007e mov ebx, dword ptr [esp+24h] 0x00000082 pushad 0x00000083 mov dl, 46h 0x00000085 mov dword ptr [ebp+122D1D53h], edx 0x0000008b popad 0x0000008c nop 0x0000008d pushad 0x0000008e push eax 0x0000008f push edx 0x00000090 pushad 0x00000091 popad 0x00000092 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246489 second address: 24648F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 24648F second address: 2464FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E47h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push esi 0x0000000b jnp 00007F22F0D06E38h 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pop esi 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 jmp 00007F22F0D06E45h 0x0000001d mov eax, dword ptr [eax] 0x0000001f push eax 0x00000020 jmp 00007F22F0D06E49h 0x00000025 pop eax 0x00000026 mov dword ptr [esp+04h], eax 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d jbe 00007F22F0D06E36h 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2464FA second address: 2464FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2464FF second address: 246513 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F22F0D06E40h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246513 second address: 246517 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246517 second address: 24653A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 mov dword ptr [ebp+122D1E17h], edi 0x0000000f push 00000003h 0x00000011 movsx edi, ax 0x00000014 push 00000000h 0x00000016 mov cl, 0Bh 0x00000018 push 00000003h 0x0000001a push 78696029h 0x0000001f push edi 0x00000020 push ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 24653A second address: 246568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 add dword ptr [esp], 47969FD7h 0x0000000d mov edx, dword ptr [ebp+122D2BE7h] 0x00000013 lea ebx, dword ptr [ebp+12451332h] 0x00000019 mov ecx, dword ptr [ebp+122D2D3Bh] 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 jnp 00007F22F0D0471Ch 0x00000028 jl 00007F22F0D04716h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246568 second address: 24656E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 24656E second address: 246572 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 24659D second address: 246660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edi 0x00000006 push eax 0x00000007 jmp 00007F22F0D06E47h 0x0000000c nop 0x0000000d jns 00007F22F0D06E3Ch 0x00000013 push 00000000h 0x00000015 mov ecx, 53444467h 0x0000001a push F4590B8Ch 0x0000001f jmp 00007F22F0D06E42h 0x00000024 add dword ptr [esp], 0BA6F4F4h 0x0000002b push 00000000h 0x0000002d push eax 0x0000002e call 00007F22F0D06E38h 0x00000033 pop eax 0x00000034 mov dword ptr [esp+04h], eax 0x00000038 add dword ptr [esp+04h], 0000001Dh 0x00000040 inc eax 0x00000041 push eax 0x00000042 ret 0x00000043 pop eax 0x00000044 ret 0x00000045 cld 0x00000046 push 00000003h 0x00000048 mov edi, ecx 0x0000004a push 00000000h 0x0000004c sub dword ptr [ebp+122D3CDBh], ecx 0x00000052 push 00000003h 0x00000054 cld 0x00000055 movzx esi, di 0x00000058 call 00007F22F0D06E39h 0x0000005d jmp 00007F22F0D06E46h 0x00000062 push eax 0x00000063 push edx 0x00000064 push edx 0x00000065 jmp 00007F22F0D06E3Eh 0x0000006a pop edx 0x0000006b pop edx 0x0000006c mov eax, dword ptr [esp+04h] 0x00000070 pushad 0x00000071 push eax 0x00000072 push edx 0x00000073 pushad 0x00000074 popad 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246660 second address: 24666A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 24666A second address: 246688 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F22F0D06E3Fh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246688 second address: 246698 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F22F0D0471Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246698 second address: 2466B1 instructions: 0x00000000 rdtsc 0x00000002 js 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 jp 00007F22F0D06E36h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2466B1 second address: 2466B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2466B5 second address: 2466FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007F22F0D06E49h 0x0000000c popad 0x0000000d pop eax 0x0000000e cld 0x0000000f lea ebx, dword ptr [ebp+1245133Bh] 0x00000015 mov dword ptr [ebp+122D3C4Eh], ebx 0x0000001b push eax 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F22F0D06E45h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2466FB second address: 246705 instructions: 0x00000000 rdtsc 0x00000002 je 00007F22F0D0471Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2467A7 second address: 2467AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2467AB second address: 2467FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F22F0D04726h 0x0000000c pop edx 0x0000000d popad 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jmp 00007F22F0D04721h 0x00000017 mov eax, dword ptr [eax] 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c jmp 00007F22F0D0471Fh 0x00000021 jne 00007F22F0D04716h 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2467FA second address: 24680C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 24680C second address: 246810 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 246810 second address: 246816 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 234584 second address: 234588 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 234588 second address: 2345BC instructions: 0x00000000 rdtsc 0x00000002 jno 00007F22F0D06E36h 0x00000008 jmp 00007F22F0D06E3Fh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F22F0D06E47h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 265A6C second address: 265A82 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D04722h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 265A82 second address: 265A87 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 265D19 second address: 265D1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 265D1D second address: 265D3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F22F0D06E43h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 265D3A second address: 265D5F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D0471Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F22F0D0471Eh 0x0000000f je 00007F22F0D04716h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 265F07 second address: 265F0C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 265F0C second address: 265F2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D04720h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jng 00007F22F0D04716h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2662FD second address: 266306 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266306 second address: 26630A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266A75 second address: 266A7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266A7B second address: 266A82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266A82 second address: 266A8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007F22F0D06E36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 25C399 second address: 25C3BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F22F0D04727h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 25C3BF second address: 25C3C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 25C3C3 second address: 25C3D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jl 00007F22F0D04716h 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 25C3D1 second address: 25C3DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnp 00007F22F0D06E36h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 22D848 second address: 22D856 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007F22F0D04722h 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266C16 second address: 266C1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266C1A second address: 266C2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007F22F0D04716h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266C2B second address: 266C51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E44h 0x00000007 jp 00007F22F0D06E36h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jo 00007F22F0D06E3Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 266C51 second address: 266C55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2675F8 second address: 26760E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E42h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26ADA1 second address: 26ADA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26ADA7 second address: 26ADAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26ADAC second address: 26ADB6 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F22F0D0471Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26ADB6 second address: 26ADC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jo 00007F22F0D06E48h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26ADC7 second address: 26ADCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26B278 second address: 26B286 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26B286 second address: 26B28C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 26B28C second address: 26B290 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 272963 second address: 272975 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jbe 00007F22F0D04716h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 272975 second address: 272984 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jno 00007F22F0D06E36h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 272DEC second address: 272DF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 273250 second address: 273257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2733D3 second address: 2733E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jg 00007F22F0D04716h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 jc 00007F22F0D04716h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2733E9 second address: 2733F3 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2733F3 second address: 2733F8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 273CE1 second address: 273CFE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F22F0D06E3Ch 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 pushad 0x00000013 push edi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 274009 second address: 27400E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2742AF second address: 2742B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2742B4 second address: 2742BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2748B5 second address: 2748F0 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d push edi 0x0000000e pop edi 0x0000000f popad 0x00000010 popad 0x00000011 mov dword ptr [esp], ebx 0x00000014 jmp 00007F22F0D06E3Fh 0x00000019 nop 0x0000001a jo 00007F22F0D06E42h 0x00000020 jnp 00007F22F0D06E3Ch 0x00000026 jnc 00007F22F0D06E36h 0x0000002c push eax 0x0000002d push esi 0x0000002e push ecx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2749DC second address: 2749E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2749E1 second address: 2749E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2749E7 second address: 2749EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 274CFE second address: 274D02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 274EB1 second address: 274EE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D04723h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jbe 00007F22F0D04716h 0x00000013 jmp 00007F22F0D0471Fh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 274EE2 second address: 274EFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F22F0D06E45h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 275E14 second address: 275E18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 275E18 second address: 275E31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F22F0D06E3Ch 0x0000000c popad 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 276F09 second address: 276F79 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c popad 0x0000000d pop eax 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 mov esi, dword ptr [ebp+122D2B3Ah] 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push eax 0x0000001d call 00007F22F0D04718h 0x00000022 pop eax 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 add dword ptr [esp+04h], 00000014h 0x0000002f inc eax 0x00000030 push eax 0x00000031 ret 0x00000032 pop eax 0x00000033 ret 0x00000034 pushad 0x00000035 mov edi, dword ptr [ebp+122D299Eh] 0x0000003b mov dword ptr [ebp+122D3CDBh], edi 0x00000041 popad 0x00000042 push 00000000h 0x00000044 push 00000000h 0x00000046 push eax 0x00000047 call 00007F22F0D04718h 0x0000004c pop eax 0x0000004d mov dword ptr [esp+04h], eax 0x00000051 add dword ptr [esp+04h], 00000015h 0x00000059 inc eax 0x0000005a push eax 0x0000005b ret 0x0000005c pop eax 0x0000005d ret 0x0000005e add dword ptr [ebp+12451AFCh], edx 0x00000064 xchg eax, ebx 0x00000065 push eax 0x00000066 push edx 0x00000067 push eax 0x00000068 pushad 0x00000069 popad 0x0000006a pop eax 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 276F79 second address: 276FA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F22F0D06E36h 0x00000009 jbe 00007F22F0D06E36h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 pushad 0x00000014 jmp 00007F22F0D06E40h 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 276FA0 second address: 276FA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2783F8 second address: 278443 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F22F0D06E38h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007F22F0D06E38h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 00000014h 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 jnl 00007F22F0D06E3Ch 0x0000002b push 00000000h 0x0000002d mov edi, ecx 0x0000002f push 00000000h 0x00000031 mov edi, 3A7DEF7Eh 0x00000036 push eax 0x00000037 jbe 00007F22F0D06E44h 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 278443 second address: 278447 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 278EFB second address: 278EFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 278C10 second address: 278C14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 278EFF second address: 278F09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F22F0D06E36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 278C14 second address: 278C21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 278F09 second address: 278F0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 278C21 second address: 278C25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27CDB0 second address: 27CDBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F22F0D06E36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27CDBB second address: 27CDD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F22F0D04721h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27D215 second address: 27D27B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 jmp 00007F22F0D06E40h 0x0000000d push 00000000h 0x0000000f mov bl, 87h 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push edi 0x00000016 call 00007F22F0D06E38h 0x0000001b pop edi 0x0000001c mov dword ptr [esp+04h], edi 0x00000020 add dword ptr [esp+04h], 0000001Bh 0x00000028 inc edi 0x00000029 push edi 0x0000002a ret 0x0000002b pop edi 0x0000002c ret 0x0000002d mov bx, cx 0x00000030 xchg eax, esi 0x00000031 push eax 0x00000032 push ebx 0x00000033 jmp 00007F22F0D06E44h 0x00000038 pop ebx 0x00000039 pop eax 0x0000003a push eax 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e push ebx 0x0000003f pop ebx 0x00000040 pushad 0x00000041 popad 0x00000042 popad 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27F135 second address: 27F13F instructions: 0x00000000 rdtsc 0x00000002 jl 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27F13F second address: 27F156 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F22F0D06E38h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e jnp 00007F22F0D06E36h 0x00000014 pop ebx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28001C second address: 280030 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jo 00007F22F0D04716h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 280030 second address: 280035 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 280035 second address: 2800B5 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F22F0D0471Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b movzx edi, bx 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007F22F0D04718h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a xor edi, dword ptr [ebp+122D29EFh] 0x00000030 or bx, 48A4h 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push eax 0x0000003a call 00007F22F0D04718h 0x0000003f pop eax 0x00000040 mov dword ptr [esp+04h], eax 0x00000044 add dword ptr [esp+04h], 00000018h 0x0000004c inc eax 0x0000004d push eax 0x0000004e ret 0x0000004f pop eax 0x00000050 ret 0x00000051 mov dword ptr [ebp+122D2942h], edx 0x00000057 movsx edi, di 0x0000005a xchg eax, esi 0x0000005b push eax 0x0000005c push edx 0x0000005d jmp 00007F22F0D04722h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28116E second address: 281173 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 281173 second address: 2811D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jne 00007F22F0D0471Eh 0x0000000e nop 0x0000000f add ebx, dword ptr [ebp+122D1D9Bh] 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push ebx 0x0000001a call 00007F22F0D04718h 0x0000001f pop ebx 0x00000020 mov dword ptr [esp+04h], ebx 0x00000024 add dword ptr [esp+04h], 0000001Ch 0x0000002c inc ebx 0x0000002d push ebx 0x0000002e ret 0x0000002f pop ebx 0x00000030 ret 0x00000031 jmp 00007F22F0D0471Eh 0x00000036 push 00000000h 0x00000038 sub ebx, dword ptr [ebp+122D2C27h] 0x0000003e push eax 0x0000003f pushad 0x00000040 pushad 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2811D1 second address: 2811EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E41h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007F22F0D06E36h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28322E second address: 283246 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007F22F0D04722h 0x00000010 jnp 00007F22F0D04716h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28497A second address: 28497E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28497E second address: 284984 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 284984 second address: 284988 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2802D7 second address: 2802E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2802E1 second address: 2802F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jp 00007F22F0D06E38h 0x00000010 pushad 0x00000011 popad 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27F320 second address: 27F324 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27F324 second address: 27F32A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 286A84 second address: 286A88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 286A88 second address: 286AA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E3Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F22F0D06E3Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 281342 second address: 281346 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 281346 second address: 281353 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 281353 second address: 281358 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 284B10 second address: 284B17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 281358 second address: 281362 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 284B17 second address: 284B30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d je 00007F22F0D06E3Ch 0x00000013 jo 00007F22F0D06E36h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 281362 second address: 281366 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28143C second address: 281442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 287AAB second address: 287AAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 288B5F second address: 288B68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 288B68 second address: 288B6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28ABB9 second address: 28ABEE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F22F0D06E43h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F22F0D06E49h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28ABEE second address: 28ABF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28ABF4 second address: 28ABF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 288CE0 second address: 288CEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 288DBD second address: 288DD0 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F22F0D06E38h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 288DD0 second address: 288DD6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 289D09 second address: 289DDC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E40h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov ebx, edi 0x0000000c push dword ptr fs:[00000000h] 0x00000013 push 00000000h 0x00000015 push ecx 0x00000016 call 00007F22F0D06E38h 0x0000001b pop ecx 0x0000001c mov dword ptr [esp+04h], ecx 0x00000020 add dword ptr [esp+04h], 00000018h 0x00000028 inc ecx 0x00000029 push ecx 0x0000002a ret 0x0000002b pop ecx 0x0000002c ret 0x0000002d or edi, dword ptr [ebp+122D2CFBh] 0x00000033 mov dword ptr fs:[00000000h], esp 0x0000003a call 00007F22F0D06E48h 0x0000003f call 00007F22F0D06E3Bh 0x00000044 sub dword ptr [ebp+1247A80Ch], edx 0x0000004a pop ebx 0x0000004b pop ebx 0x0000004c mov eax, dword ptr [ebp+122D0E01h] 0x00000052 push 00000000h 0x00000054 push eax 0x00000055 call 00007F22F0D06E38h 0x0000005a pop eax 0x0000005b mov dword ptr [esp+04h], eax 0x0000005f add dword ptr [esp+04h], 0000001Dh 0x00000067 inc eax 0x00000068 push eax 0x00000069 ret 0x0000006a pop eax 0x0000006b ret 0x0000006c mov edi, dword ptr [ebp+122D2BEBh] 0x00000072 push FFFFFFFFh 0x00000074 jmp 00007F22F0D06E43h 0x00000079 mov dword ptr [ebp+122D2942h], esi 0x0000007f nop 0x00000080 jno 00007F22F0D06E3Ah 0x00000086 push eax 0x00000087 push edi 0x00000088 push eax 0x00000089 push edx 0x0000008a push eax 0x0000008b push edx 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 286D1A second address: 286D26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 289DDC second address: 289DE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28CC0D second address: 28CC11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28CC11 second address: 28CC3A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F22F0D06E38h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F22F0D06E46h 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28CC3A second address: 28CC44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28DB67 second address: 28DB6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28DB6C second address: 28DBCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov dword ptr [ebp+122D3CDBh], edi 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007F22F0D04718h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push edi 0x00000031 call 00007F22F0D04718h 0x00000036 pop edi 0x00000037 mov dword ptr [esp+04h], edi 0x0000003b add dword ptr [esp+04h], 0000001Ch 0x00000043 inc edi 0x00000044 push edi 0x00000045 ret 0x00000046 pop edi 0x00000047 ret 0x00000048 push eax 0x00000049 jl 00007F22F0D0471Eh 0x0000004f push esi 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 28CDFC second address: 28CE06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F22F0D06E36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 23E7CB second address: 23E7D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 23E7D2 second address: 23E7EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E47h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 296382 second address: 2963AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F22F0D04716h 0x0000000a pop ebx 0x0000000b pushad 0x0000000c jnl 00007F22F0D04716h 0x00000012 jmp 00007F22F0D04724h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2963AA second address: 2963BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E3Ch 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2963BB second address: 2963D3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D04722h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 29D10A second address: 29D110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 29D110 second address: 29D11A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 29D27E second address: 29D284 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 29D284 second address: 29D2E6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F22F0D04723h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F22F0D04729h 0x00000012 jmp 00007F22F0D0471Fh 0x00000017 popad 0x00000018 mov eax, dword ptr [esp+04h] 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F22F0D04728h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A10C9 second address: 2A10DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jnp 00007F22F0D06E50h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A133D second address: 2A1343 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A1343 second address: 2A1347 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A1907 second address: 2A195B instructions: 0x00000000 rdtsc 0x00000002 js 00007F22F0D04746h 0x00000008 jmp 00007F22F0D04728h 0x0000000d jmp 00007F22F0D04728h 0x00000012 push eax 0x00000013 push edx 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 jmp 00007F22F0D04728h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A614C second address: 2A6150 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A6150 second address: 2A618F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F22F0D04723h 0x0000000c jmp 00007F22F0D04727h 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F22F0D0471Bh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A618F second address: 2A61AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E47h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B398 second address: 27B39C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B39C second address: 27B3A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B3A0 second address: 27B3A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B3A6 second address: 27B3AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B3AB second address: 27B3E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D04722h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f mov dx, 3E2Ch 0x00000013 lea eax, dword ptr [ebp+12486160h] 0x00000019 cld 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d jno 00007F22F0D0471Ch 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B3E1 second address: 27B3E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B3E6 second address: 27B3EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B3EC second address: 25C399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a pushad 0x0000000b xor esi, dword ptr [ebp+122D2E17h] 0x00000011 sub dword ptr [ebp+1247A760h], esi 0x00000017 popad 0x00000018 call dword ptr [ebp+122D1C92h] 0x0000001e pushad 0x0000001f push ecx 0x00000020 pushad 0x00000021 popad 0x00000022 push edi 0x00000023 pop edi 0x00000024 pop ecx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 pop eax 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B4B6 second address: 27B4BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B4BC second address: 27B4C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B7A1 second address: C8E12 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b mov dword ptr [esp], eax 0x0000000e movzx ecx, cx 0x00000011 push dword ptr [ebp+122D13E9h] 0x00000017 jns 00007F22F0D0471Ch 0x0000001d call dword ptr [ebp+122D2A9Bh] 0x00000023 pushad 0x00000024 pushad 0x00000025 mov edi, dword ptr [ebp+122D2F17h] 0x0000002b add dword ptr [ebp+122D1DA8h], ebx 0x00000031 popad 0x00000032 xor eax, eax 0x00000034 mov dword ptr [ebp+122D292Fh], ebx 0x0000003a mov edx, dword ptr [esp+28h] 0x0000003e pushad 0x0000003f or edx, 529C6C87h 0x00000045 xor ecx, 18EC80D5h 0x0000004b popad 0x0000004c mov dword ptr [ebp+122D2DA7h], eax 0x00000052 mov dword ptr [ebp+122D2ACCh], esi 0x00000058 mov esi, 0000003Ch 0x0000005d cld 0x0000005e add esi, dword ptr [esp+24h] 0x00000062 jmp 00007F22F0D0471Ch 0x00000067 lodsw 0x00000069 cmc 0x0000006a add eax, dword ptr [esp+24h] 0x0000006e jmp 00007F22F0D0471Ch 0x00000073 mov ebx, dword ptr [esp+24h] 0x00000077 pushad 0x00000078 mov dl, 46h 0x0000007a mov dword ptr [ebp+122D1D53h], edx 0x00000080 popad 0x00000081 nop 0x00000082 pushad 0x00000083 push eax 0x00000084 push edx 0x00000085 pushad 0x00000086 popad 0x00000087 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27B90D second address: 27B914 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27BA05 second address: 27BA15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F22F0D0471Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C25D second address: 27C261 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C261 second address: 27C27E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D04729h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C27E second address: 27C284 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C284 second address: 27C293 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C293 second address: 27C297 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C297 second address: 27C29D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C29D second address: 27C2A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C50A second address: 27C567 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D04726h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a nop 0x0000000b sub dword ptr [ebp+122D29EFh], edx 0x00000011 lea eax, dword ptr [ebp+124861A4h] 0x00000017 push 00000000h 0x00000019 push ecx 0x0000001a call 00007F22F0D04718h 0x0000001f pop ecx 0x00000020 mov dword ptr [esp+04h], ecx 0x00000024 add dword ptr [esp+04h], 00000018h 0x0000002c inc ecx 0x0000002d push ecx 0x0000002e ret 0x0000002f pop ecx 0x00000030 ret 0x00000031 sub dword ptr [ebp+122D2572h], edx 0x00000037 nop 0x00000038 push eax 0x00000039 push edx 0x0000003a jnp 00007F22F0D0471Ch 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C567 second address: 25CED9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F22F0D06E36h 0x00000009 jmp 00007F22F0D06E41h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 js 00007F22F0D06E3Eh 0x00000018 jc 00007F22F0D06E38h 0x0000001e push edi 0x0000001f pop edi 0x00000020 nop 0x00000021 mov dword ptr [ebp+122D1E0Fh], edx 0x00000027 lea eax, dword ptr [ebp+12486160h] 0x0000002d jmp 00007F22F0D06E47h 0x00000032 mov dl, ah 0x00000034 nop 0x00000035 pushad 0x00000036 jno 00007F22F0D06E38h 0x0000003c jmp 00007F22F0D06E42h 0x00000041 popad 0x00000042 push eax 0x00000043 jnl 00007F22F0D06E44h 0x00000049 nop 0x0000004a push 00000000h 0x0000004c push edx 0x0000004d call 00007F22F0D06E38h 0x00000052 pop edx 0x00000053 mov dword ptr [esp+04h], edx 0x00000057 add dword ptr [esp+04h], 0000001Bh 0x0000005f inc edx 0x00000060 push edx 0x00000061 ret 0x00000062 pop edx 0x00000063 ret 0x00000064 mov dword ptr [ebp+122D2A25h], esi 0x0000006a call dword ptr [ebp+122D1D43h] 0x00000070 jbe 00007F22F0D06E42h 0x00000076 js 00007F22F0D06E3Ch 0x0000007c push eax 0x0000007d push edx 0x0000007e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A5440 second address: 2A544A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27C5E5 second address: 25CED9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push edx 0x0000000a call 00007F22F0D06E38h 0x0000000f pop edx 0x00000010 mov dword ptr [esp+04h], edx 0x00000014 add dword ptr [esp+04h], 0000001Bh 0x0000001c inc edx 0x0000001d push edx 0x0000001e ret 0x0000001f pop edx 0x00000020 ret 0x00000021 mov dword ptr [ebp+122D2A25h], esi 0x00000027 call dword ptr [ebp+122D1D43h] 0x0000002d jbe 00007F22F0D06E42h 0x00000033 js 00007F22F0D06E3Ch 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A5848 second address: 2A584E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A584E second address: 2A585A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 jnl 00007F22F0D06E36h 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A585A second address: 2A5864 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A5864 second address: 2A587F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jo 00007F22F0D06E36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F22F0D06E3Ah 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A5C86 second address: 2A5C8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A5C8C second address: 2A5CAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F22F0D06E41h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2A5CAD second address: 2A5CB2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2ADEDE second address: 2ADF02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E40h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F22F0D06E3Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2ADF02 second address: 2ADF06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE082 second address: 2AE091 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E3Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE091 second address: 2AE0A4 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b pushad 0x0000000c popad 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE0A4 second address: 2AE0A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE5FD second address: 2AE607 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE607 second address: 2AE613 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE613 second address: 2AE617 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE791 second address: 2AE795 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE92F second address: 2AE933 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE933 second address: 2AE943 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F22F0D06E36h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AE943 second address: 2AE95E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F22F0D04725h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AEC67 second address: 2AECB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E48h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d jmp 00007F22F0D06E42h 0x00000012 jmp 00007F22F0D06E48h 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2AECB2 second address: 2AECB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2ADA3B second address: 2ADA3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 230F15 second address: 230F2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F22F0D04724h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 230F2D second address: 230F46 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E42h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B3E09 second address: 2B3E17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007F22F0D04716h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B3E17 second address: 2B3E51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F22F0D06E42h 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007F22F0D06E48h 0x00000012 jo 00007F22F0D06E42h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B3E51 second address: 2B3E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B3E57 second address: 2B3E6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F22F0D06E3Ch 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B3FEB second address: 2B400A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F22F0D0471Dh 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jo 00007F22F0D0471Ah 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B4733 second address: 2B4745 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F22F0D06E36h 0x0000000a je 00007F22F0D06E36h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B4745 second address: 2B4753 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jo 00007F22F0D04716h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B4753 second address: 2B4759 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2B4759 second address: 2B476A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2BB6F7 second address: 2BB6FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2BB869 second address: 2BB86D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2BBA31 second address: 2BBA36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 23B14B second address: 23B151 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2BDC61 second address: 2BDC67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2BDC67 second address: 2BDC6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C3785 second address: 2C378A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C378A second address: 2C37A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D04722h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C3922 second address: 2C3934 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E3Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C3A4D second address: 2C3A5F instructions: 0x00000000 rdtsc 0x00000002 js 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b jns 00007F22F0D04716h 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C708D second address: 2C70A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F22F0D06E36h 0x0000000a jl 00007F22F0D06E36h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C70A4 second address: 2C70B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jg 00007F22F0D04716h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C70B0 second address: 2C70B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C70B6 second address: 2C70BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C70BA second address: 2C70C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C70C0 second address: 2C70D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b jns 00007F22F0D04716h 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edi 0x00000014 pop edi 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C70D6 second address: 2C70E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F22F0D06E36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C699F second address: 2C69A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C69A5 second address: 2C69B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E3Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C69B8 second address: 2C69BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C69BE second address: 2C69C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C6DB1 second address: 2C6DB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C6DB5 second address: 2C6DCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F22F0D06E42h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2C6DCF second address: 2C6DDE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jc 00007F22F0D04716h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2CB319 second address: 2CB31D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2CB5BD second address: 2CB5D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D04720h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2CB5D1 second address: 2CB5FF instructions: 0x00000000 rdtsc 0x00000002 jp 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F22F0D06E3Bh 0x00000010 jmp 00007F22F0D06E45h 0x00000015 push ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2CB9E4 second address: 2CB9E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27BF19 second address: 27BF1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27BF1D second address: 27BF2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27BF2A second address: 27BF9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F22F0D06E36h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007F22F0D06E38h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 call 00007F22F0D06E44h 0x0000002e sbb dl, 00000001h 0x00000031 pop edx 0x00000032 call 00007F22F0D06E49h 0x00000037 pop ecx 0x00000038 mov ebx, dword ptr [ebp+1248619Fh] 0x0000003e mov cl, 2Eh 0x00000040 add eax, ebx 0x00000042 mov edi, esi 0x00000044 stc 0x00000045 push eax 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 27BF9B second address: 27BFA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2CBCFC second address: 2CBD25 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F22F0D06E3Eh 0x00000008 jmp 00007F22F0D06E46h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2CC71E second address: 2CC723 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D2B30 second address: 2D2B42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007F22F0D06E36h 0x0000000c popad 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3226 second address: 2D3240 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 jmp 00007F22F0D04723h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3556 second address: 2D355F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3AAB second address: 2D3AC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F22F0D04723h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3AC2 second address: 2D3AD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E3Dh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3AD9 second address: 2D3B0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F22F0D0471Eh 0x00000012 jmp 00007F22F0D04729h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3B0E second address: 2D3B14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3B14 second address: 2D3B29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D0471Ch 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3B29 second address: 2D3B31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D3DCE second address: 2D3DD4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D461D second address: 2D4623 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D4623 second address: 2D4627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D9C9A second address: 2D9CA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2D9CA0 second address: 2D9CCE instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jp 00007F22F0D0471Ah 0x00000010 pushad 0x00000011 popad 0x00000012 push edx 0x00000013 pop edx 0x00000014 jmp 00007F22F0D04727h 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DDA90 second address: 2DDABF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E43h 0x00000007 jmp 00007F22F0D06E48h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DDABF second address: 2DDAE4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jp 00007F22F0D04716h 0x00000009 jmp 00007F22F0D04728h 0x0000000e pop esi 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DDAE4 second address: 2DDAFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F22F0D06E36h 0x0000000a push eax 0x0000000b pop eax 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jg 00007F22F0D06E4Ah 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD234 second address: 2DD246 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c jnp 00007F22F0D04716h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD246 second address: 2DD253 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD3AF second address: 2DD3C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 jc 00007F22F0D0471Ah 0x0000000c push esi 0x0000000d pop esi 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD3C3 second address: 2DD3C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD3C9 second address: 2DD3CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD525 second address: 2DD529 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD529 second address: 2DD52F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD52F second address: 2DD535 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD535 second address: 2DD54B instructions: 0x00000000 rdtsc 0x00000002 ja 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jp 00007F22F0D04724h 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 pop edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD54B second address: 2DD54F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD7CC second address: 2DD7D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD7D0 second address: 2DD7F5 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jne 00007F22F0D06E45h 0x00000010 popad 0x00000011 push edi 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DD7F5 second address: 2DD7FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F22F0D04716h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2DF20F second address: 2DF219 instructions: 0x00000000 rdtsc 0x00000002 js 00007F22F0D06E36h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E5E71 second address: 2E5E79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E5E79 second address: 2E5E9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F22F0D06E36h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d jmp 00007F22F0D06E40h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E5E9A second address: 2E5EA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E5EA0 second address: 2E5EA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E60D8 second address: 2E60DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E60DC second address: 2E60EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F22F0D06E3Bh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E60EF second address: 2E60F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E60F5 second address: 2E60F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E650F second address: 2E6515 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E67E0 second address: 2E67EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F22F0D06E38h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E6AD4 second address: 2E6ADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push ecx 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E718E second address: 2E71C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E41h 0x00000007 jmp 00007F22F0D06E46h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebx 0x0000000f jnp 00007F22F0D06E3Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2E783A second address: 2E7840 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2EE671 second address: 2EE675 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2EE02A second address: 2EE030 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2EE030 second address: 2EE034 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2EE034 second address: 2EE03A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2EE03A second address: 2EE03F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2EE03F second address: 2EE060 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D0471Eh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 js 00007F22F0D04716h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2F953A second address: 2F9558 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E40h 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jbe 00007F22F0D06E36h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2F9558 second address: 2F955C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2F955C second address: 2F9562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 2F9562 second address: 2F9581 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F22F0D04729h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 305D6A second address: 305D6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 305D6E second address: 305D8D instructions: 0x00000000 rdtsc 0x00000002 jo 00007F22F0D04716h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F22F0D04723h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 305D8D second address: 305D91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 305D91 second address: 305D99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 318C8C second address: 318C94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 318C94 second address: 318CB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D04720h 0x00000007 jmp 00007F22F0D0471Bh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 318CB3 second address: 318CEC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E46h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jl 00007F22F0D06E36h 0x00000013 push edx 0x00000014 pop edx 0x00000015 popad 0x00000016 jne 00007F22F0D06E38h 0x0000001c jbe 00007F22F0D06E3Eh 0x00000022 push esi 0x00000023 pop esi 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317500 second address: 31753E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F22F0D04723h 0x0000000b jmp 00007F22F0D0471Eh 0x00000010 popad 0x00000011 push esi 0x00000012 pushad 0x00000013 jg 00007F22F0D04716h 0x00000019 jnc 00007F22F0D04716h 0x0000001f jg 00007F22F0D04716h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31797A second address: 317982 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317982 second address: 3179B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D0471Eh 0x00000007 jmp 00007F22F0D0471Eh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 je 00007F22F0D04716h 0x0000001a push edi 0x0000001b pop edi 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f push ecx 0x00000020 pop ecx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 3179B5 second address: 3179B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317CB1 second address: 317CC4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F22F0D04716h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317CC4 second address: 317CC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317CC8 second address: 317CD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317CD2 second address: 317CDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F22F0D06E36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317CDC second address: 317CEA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D0471Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317CEA second address: 317CFC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a js 00007F22F0D06E3Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317E51 second address: 317E7B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007F22F0D04716h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F22F0D04720h 0x00000011 push edi 0x00000012 ja 00007F22F0D04716h 0x00000018 pop edi 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 317E7B second address: 317E92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E42h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31A5E9 second address: 31A5ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31A5ED second address: 31A600 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F22F0D06E3Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31A600 second address: 31A609 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edi 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31A609 second address: 31A611 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31A43E second address: 31A444 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31A444 second address: 31A45C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007F22F0D06E47h 0x0000000b jmp 00007F22F0D06E3Bh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DE01 second address: 31DE16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 jc 00007F22F0D04722h 0x0000000d jne 00007F22F0D04716h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DE16 second address: 31DE4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E46h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f jc 00007F22F0D06E36h 0x00000015 pop eax 0x00000016 jmp 00007F22F0D06E3Eh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DE4B second address: 31DE6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007F22F0D04729h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DE6A second address: 31DE86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E3Ah 0x00000007 jmp 00007F22F0D06E3Ah 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DE86 second address: 31DE8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DADB second address: 31DAEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E3Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DAEC second address: 31DAF8 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F22F0D04716h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 31DAF8 second address: 31DAFD instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 3264EE second address: 3264F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 32CF88 second address: 32CFA0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D06E44h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 32CFA0 second address: 32CFA7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 32CE5A second address: 32CE65 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 ja 00007F22F0D06E36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 32A217 second address: 32A22F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D04722h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 33A395 second address: 33A399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 33A399 second address: 33A39F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 33A0DA second address: 33A0DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 34F12F second address: 34F147 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D04724h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 34F147 second address: 34F14D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 34FCAF second address: 34FCE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop edi 0x00000008 pushad 0x00000009 jmp 00007F22F0D04723h 0x0000000e jmp 00007F22F0D0471Ah 0x00000013 jnc 00007F22F0D0471Ah 0x00000019 push eax 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 34FDFC second address: 34FE13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F22F0D06E42h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 34FE13 second address: 34FE23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F22F0D04716h 0x0000000a jc 00007F22F0D04716h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 351732 second address: 351738 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 35904A second address: 359050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 359050 second address: 359062 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F22F0D06E3Dh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 359062 second address: 35907B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F22F0D04724h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 35907B second address: 359084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 276887 second address: 276896 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F22F0D0471Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 276896 second address: 2768A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F22F0D06E36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 276D39 second address: 276D3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k6olCJyvIj.exe | RDTSC instruction interceptor: First address: 276D3D second address: 276D47 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F22F0D06E36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |